id,blogroll_id,tag 156,23,vulnerability research 157,23,fuzzing 158,23,exploit development 159,23,CTF 160,23,hypervisors 161,23,Windows Internals 162,23,SHRECS 163,23,reverse engineering 164,23,CSAW 165,23,FCSC