"Dude, I've played around with nmap and metasploit in Kali, but honestly, it's a lot safer to stick to virtual machines. I've seen too many people get burnt using live distros for actual hacking attempts. Has anyone tried using a VM for this setup?"
I'm a bit concerned about sharing this kind of info publicly, but if you're looking to learn about nmap and Metasploit, I recommend checking out the official Kali Linux tutorials. They have a great course on web exploitation using Metasploit, and nmap is pretty straightforward to use once you get the hang of it.