id,blogroll_id,tag 228,30,embedded systems 229,30,firmware 230,30,reverse engineering 231,30,hardware hacking 232,30,ARM 233,30,Ghidra 234,30,debugging 235,30,Remoticon 236,30,Hackaday 237,30,software analysis