Six Malicious Linux Shell Scripts Used to Evade Defenses and How to Stop Them