id,blogroll_id,tag 118,19,hacking 119,19,penetration testing 120,19,security research 121,19,hardware hacking 122,19,infosec 123,19,reverse engineering 124,19,CTF 125,19,vulnerability research 126,19,cybersecurity 127,19,bug hunting