Metasploit for Cyber-Physical Security Testing with Real-Time Constraints