id,blogroll_id,tag 260,33,malware analysis 261,33,reverse engineering 262,33,CTF 263,33,process injection 264,33,memory forensics 265,33,exploitation 266,33,.NET 267,33,C2 268,33,ammunition evasion 269,33,Windows security 270,33,penetration testing 271,33,HackTheBox