The first is time and useful resource consuming. You or a member of one's crew should really test and develop your own personal exploit. The easier way is to make a behavior of checking frequently one of the top rated exploit databases. to plain TCP scans of varied application. It https://blackanalytica.com/index.php#services