Established in 2021 by Hossein Seilany, it is a polymorphic security platform for pen-testing and ethical hacking. It is also hardened, secure, anonymous, and privacy-focused.
Predator Linux is based on Debian stable, kernel 6.1 and 6.6 LTS, and uses a fully customized Plasma lightweight desktop with released. It has a special menu of tools. Predator-os Linux has around 1200 pre-installed tools which is split into 40 several categories in 9 security modes. Predator Tools are imported from both Debian and Ubuntu repositories and the GitHub page. Most kernel and user configs are customized by default to prevent any hacking, or non-privileged access and reduce the attack surface. many built-in firewalls and defensive tools allow end-users to control the Predator-OS. Predator also supports many privacy, anonymized, security tools, and also both to be run as Live-CD or from a USB Drive and installation mode.
Hopefully, This OS can be beneficial for all normal and more refined users. for any suggestions or recommended contact: info.predator.os@gmail.com
OS Type: Linux
Based on: Debian stable
Kernel: 6.1 and 6.6 LTS
Origin: Emperor-os.ir Team (Iran)
Architecture: x86_64
Default Desktop: Plasma
Other Desktop: coming soon : Gnome, xfce, mate
Category: penetration testing, security, privacy, Forensics, Live Medium, hardened, anonymized
Predator Linux requires:
A minimum of 20 GB hard disk space for installation.
A minimum of 2GB RAM for i386 and AMD64 architectures.
A bootable CD-DVD drive or a USB stick.
A minimum of an Intel Core i3 or an AMD E1 processor
for good performance.
The recommended hardware specification for a smooth experience is:
20 GB of hard disk space, SSD preferred
At least 2048 MB of RAM
The Predator-OS has 9 different modes and operates at the following modes for easy and faster access to all tools, and also it is possible to change Linux Predator to: defensive, offensive, privacy, hardened, secured, settings, and pen-testing modes quickly.
1) Included in more than 2 TB password list. 2) Included in more than 500 lists of the red and blue team tools. 3) Included in more than 200 lists of AWS-cloud tools. 4) Included more than 10 sets of roadmaps in cybersecurity 5) Included more than 100 search engines in security and penetration testing 6) Included more than 300 educational scripts in security and penetration testing 7) Included in more than 100 security training websites and penetration testing for kids. 8) Included more than 10 tools for running cybersecurity lab and penetration testing 9) Included more than 40 websites for running a lab in cybersecurity and penetration testing 10) Included the source of 800 Malware files in 80 different groups (400 MB file) 11) Included 1000 websites for OSINT. 12) Included more than 70 online and self-reading websites in cybersecurity. 13) Included in more than 11 offline and self-study training categories in cybersecurity. 14) Included 600 forensic and reverse engineering tools. 15) Included more than 6000 Google dorks and exploits as offline
1) Included in more than 2 TB (Online + Offline) password lists. 2) Included in more than 500 lists of Red and Blue team tools. 3) Included in more than 200 lists of AWS cloud tools. 4) Included in Web3 security tools. 5) Included in more than 10 sets of roadmaps in cybersecurity. 6) Included in more than 100 search engines for security and penetration testing. 7) Included in more than 300 educational scripts for security and penetration testing. 8) Included in more than 100 security training websites and penetration testing resources for kids. 9) Included in more than 10 tools for running a cybersecurity lab and conducting penetration testing. 10) Included in more than 40 websites for running a cybersecurity lab. 11) Included in the source of 800 malware files, divided into 80 different groups (400 MB file). 12) Included in 1000 websites for OSINT (Open 13) source intelligence). 14) Included in more than 70 online and self 15) reading websites in cybersecurity. 16) Included in more than 11 offline and self 17) study training categories in cybersecurity. 18) Included in 600 forensic and reverse engineering tools. 19) Included in more than 6000 Google dorks and exploits as offline resources.
1) In order to improve the performance of the CPU frequency range has been changed intel_pstate to acpi-cpufreq by default. 2) The BIOS frequency limitation has been disabled by default in order to improve the performance of the CPU frequency range, 3) In order to improve the performance of the hard disk and boot time, the watchdog has been disabled by default. 4) Improving the performance of the hard disk by changing the I/O scheduler for SATA, HDD, and NVMe disks. 5) Improved CPU performance by changing the default kernel scheduler to a Linux-zen kernel. 6) Improving network and Internet performance by changing the Bottleneck Bandwidth and Round-trip propagation time (BBR). 7) Improved RAM memory function by changing the randomize_va_space status. 8) Improved virtual memory performance by replacing zswap instead of swap by default. 9) The hardware threads (physical CPU) for each CPU core have been enabled. 10) Improving the paralleling of tasks by allowing independent tasks (running threads) by sharing some processor resources. 11) Changed power saving mode to performance mode by default, In order to improve the performance of the disk and network IO. 12) All CPU governor frequency has switched in performance. 13) Reducing kernel log-level reports to a low level in order to improve kernel performance increase security and create silent boot mode. 14) and also, improving TCP performance, increasing inode cache memory, disk cache, improving network and bandwidth parameters, etc.
1) Includes many boot grub parameters both in live and after installation. 2) Disables many unnecessary services and loggers during the boot-up. 3) Allows the kernel to automatically proceed without prompting the user for any input. 4) Improves and includes security features that protect against certain types of attacks. 5) Improves and includes performance tuning features for low latency behavior of the system. 6) Automatically detects other operating systems installed on the system and adds them to the GRUB boot menu. 7) Changes to the calamares installer instead of the default ubiquity installer. 8) Provides easy installation and better user-friendly tools and environment. 9) Suitable for newbie users and useful for general work compared to Parrot and Kali distribution. 10) Includes the best privacy, hardening, anonymous configuration, and tools. 11) Offers a lighter and smaller download file size, despite having more tools than BlackArch, Tsurugi Linux, and dracOS Linux distributions. 12) Has the ability to boot both in live mode and for installation, unlike deft, Discreete Linux, despite having all the tools of that distribution. 13) Includes the feature of booting in safe mode, text-mode, Noacpi, Iommu, forensic mode, and having CLI tools like the dracOS distribution that lacks graphical tools. 14) Includes all Bugtraq Linux tools. 15) Includes more web penetration testing tools than Samurai Linux. 16) Includes more tools than BackBox Linux. 17) Includes all Pentoo Linux tools. 18) Includes specialized PC crime detection tools and also the ability to run Windows tools in Linux, such as deft and CAINE Linux. 19) Includes Kodachi Linux features in the field of privacy and anonymity. 20) Includes secure and privacy features of Discreete Linux. 21) Includes all Santoku Linux tools in the field of Mobile pen-testing. 22) Includes the Whonix distribution features for more security and anonymity. 23) Includes all Attifyos Linux tools in the field of IoT penetration testing and even more with a user-friendly interface. 24) Includes all stressLinux tools in the field of stress testing and more. 25) Includes the features of anonymity on the web, such as IprediaOS distribution. 26) Includes many tools from the following site: insecure.org.
Username= predator Password = predator
https://zarinp.al/learninghive.ir
0xd15e9222ee44349DabFae6F61dD7382617e7A563
Providing Linux hosting services, selling SSL certificates, registering and transferring domains, and hosting. site link