Linux evasion techniques were previously included as part of persistence, but the number of techniques are varied enough where it likely should be its own article.