1. Different linux Commands and Utilities Commonly Used by Attackers. https://www.uptycs.com/blog/linux-commands-and-utilities-commonly-used-by-attackers
2. Evasive techniques used by malicious shell scripts on different unix systems. https://www.uptycs.com/blog/evasive-techniques-used-by-malicious-linux-shell-scripts
3. LOLBAS. https://lolbas-project.github.io/
4. Tree-sitter Using Parsers. https://tree-sitter.github.io/tree-sitter/using-parsers
5. What Is a Reverse Shell $$|$$ Examples & Prevention Techniques $$|$$ Imperva