This article has been moved to:

Metasploit Cheat Sheet