DocumentationPART 5 — Forensics, Research & MethodologyModule 9 —Module 9 —Next9.1-tor-forensics-what-can-actually-be-recovered9.2-blockchain-forensics-behavioral-clustering9.3-memory-analysis-techniques-in-hidden-service-hosts9.4-host-fingerprinting-through-subtle-misconfigurations9.5-metadata-leaks-in-hosting-environments9.6-detecting-botnets-in-hidden-networks9.7-correlating-hidden-service-behavior-with-clearnet-artifacts9.8-intelligence-linking-through-linguistic-stylometrydocs