Discover vulnerabilities
Attack tree
1 Port scanning (AND)
2 Check for potential known problems and vulnerabilities with found ports
Ports
The Ports Database is a comprehensive, searchable database of official and unofficial tcp/udp port assignments, known vulnerabilities, trojans, applications use and more.
Ports cheatsheet - quick access list
Databases
Security researchers store & share PoC’s (Proof of Concept) on GitHub.
Searchsploit, an offline copy of Exploit-DB