HACKER Q&A
📣 bryanwt

Is there a list of known software attack vectors?


Most informational guides [0] feel like landing pages and enterprise tools [1] often point to internally profitable reporting services and bug bounty programs.

Individual postmortems are available, but a public aggregator or database of information feels too high value to not exist. Should I be looking at books? I would think they quickly become dated.

[0]: http://www.njamha.org/it/resources/WhitePaper_CyberAttackSurvivalChecklist.pdf

[1]: https://github.com/features/security


  👤 aespinoza Accepted Answer ✓
Not sure if this is what you are referring to, but this page contains a list of offensive techniques which could be used to create attack vectors:

https://attack.mitre.org/