Malware: Technical Guides and Deep DivesFamous Malware: Network Communication Technical AnalysesProtocol Guides for C2/Covert Channel/Backdoors