An award-winning cannabis podcast for women, by women. Hear joyful stories and useful advice about cannabis for health, well-being, and fun—especially for needs specific to women like stress, sleep, and sex. We cover everything from: What’s the best weed for sex? Can I use CBD for menstrual cramps? What are the effects of the Harlequin strain or Gelato strain? And, why do we prefer to call it “cannabis” instead of “marijuana”? We also hear from you: your first time buying legal weed, and how ...
…
continue reading
M4A•Episode home
Manage episode 316054881 series 3242802
Content provided by thehackerish. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by thehackerish or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Hello ethical hackers and welcome to the world of hacking and bug bounty hunting. Today, I will share the tools I use to gather open source intelligence and perform subdomain enumeration. Every craftsman has its toolbox and a bounty hunter is no different. However, it’s easy to get lost in the growing number of bug bounty tools which get published by the community everyday. That’s why one of the goals of this article is to provide you with the minimal tools which provide the maximum returns.
Links to all the tools are available on the blog post on: https://thehackerish.com/bug-bounty-tools-from-enumeration-to-reporting/
11 episodes