id,blogroll_id,tag 166,24,exploit development 167,24,Windows Internals 168,24,assembly 169,24,C programming 170,24,kernel exploitation 171,24,memory management 172,24,browser exploits 173,24,reverse engineering 174,24,vulnerability research 175,24,security research