Skip to content

The distro is for penetration testing and ethical hacking and also privacy, hardened, secure, anonymized Linux distro.Predator Linux has around 1300 pre-installed tools which are split into 30 several categories.

Notifications You must be signed in to change notification settings

hosseinseilani/predator-os

Repository files navigation

Predator-OS Linux

Polymorphic Security Platform

A security-centric free open-source Linux

Penetration testing and Ethical hacking and also you can use it as privacy, hardened, secure, anonymized

[site link](http://predator-os.ir/)

Established in 2021 by Hossein Seilany, it is a polymorphic security platform for pen-testing and ethical hacking. It is also hardened, secure, anonymous, and privacy-focused.

Predator Linux is based on Debian stable, kernel 6.1 and 6.6 LTS, and uses a fully customized Plasma lightweight desktop with released. It has a special menu of tools. Predator-os Linux has around 1200 pre-installed tools which is split into 40 several categories in 9 security modes. Predator Tools are imported from both Debian and Ubuntu repositories and the GitHub page. Most kernel and user configs are customized by default to prevent any hacking, or non-privileged access and reduce the attack surface. many built-in firewalls and defensive tools allow end-users to control the Predator-OS. Predator also supports many privacy, anonymized, security tools, and also both to be run as Live-CD or from a USB Drive and installation mode.

Hopefully, This OS can be beneficial for all normal and more refined users. for any suggestions or recommended contact: [email protected]

Specifications:

	OS Type: Linux
	Based on: Debian stable 
	Kernel: 6.1 and 6.6 LTS
	Origin: Emperor-os.ir  Team (Iran)
	Architecture: x86_64 
	Default Desktop: Plasma
	Other Desktop: coming soon : Gnome, xfce, mate
	Category: penetration testing, security, privacy, Forensics, Live Medium, hardened, anonymized
	Predator Linux requires:
	A minimum of 20 GB hard disk space for installation.
	A minimum of 2GB RAM for i386 and AMD64 architectures.
	A bootable CD-DVD drive or a USB stick.
	A minimum of an Intel Core i3 or an AMD E1 processor
	for good performance.
	The recommended hardware specification for a smooth experience is:
	20 GB of hard disk space, SSD preferred
	At least 2048 MB of RAM

#Polymorphic Security Platform: The Predator-OS has 9 different modes and operates at the following modes for easy and faster access to all tools, and also it is possible to change Linux Predator to: defensive, offensive, privacy, hardened, secured, settings, and pen-testing modes quickly.

Top Features:

  1. Included in more than 2 TB password list.
  2. Included in more than 500 lists of the red and blue team tools.
  3. Included in more than 200 lists of AWS-cloud tools.
  4. Included more than 10 sets of roadmaps in cybersecurity
  5. Included more than 100 search engines in security and penetration testing
  6. Included more than 300 educational scripts in security and penetration testing
  7. Included in more than 100 security training websites and penetration testing for kids.
  8. Included more than 10 tools for running cybersecurity lab and penetration testing
  9. Included more than 40 websites for running a lab in cybersecurity and penetration testing
  10. Included the source of 800 Malware files in 80 different groups (400 MB file)
  11. Included 1000 websites for OSINT.
  12. Included more than 70 online and self-reading websites in cybersecurity.
  13. Included in more than 11 offline and self-study training categories in cybersecurity.
  14. Included 600 forensic and reverse engineering tools.
  15. Included more than 6000 Google dorks and exploits as offline

Improving performance and tuned kernel and user levels:

  1. Included in more than 2 TB (Online + Offline) password lists.
  2. Included in more than 500 lists of Red and Blue team tools.
  3. Included in more than 200 lists of AWS cloud tools.
  4. Included in Web3 security tools.
  5. Included in more than 10 sets of roadmaps in cybersecurity.
  6. Included in more than 100 search engines for security and penetration testing.
  7. Included in more than 300 educational scripts for security and penetration testing.
  8. Included in more than 100 security training websites and penetration testing resources for kids.
  9. Included in more than 10 tools for running a cybersecurity lab and conducting penetration testing.
  10. Included in more than 40 websites for running a cybersecurity lab.
  11. Included in the source of 800 malware files, divided into 80 different groups (400 MB file).
  12. Included in 1000 websites for OSINT (Open
  13. source intelligence).
  14. Included in more than 70 online and self
  15. reading websites in cybersecurity.
  16. Included in more than 11 offline and self
  17. study training categories in cybersecurity.
  18. Included in 600 forensic and reverse engineering tools.
  19. Included in more than 6000 Google dorks and exploits as offline resources.

more features

  1. In order to improve the performance of the CPU frequency range has been changed intel_pstate to acpi-cpufreq by default.
  2. The BIOS frequency limitation has been disabled by default in order to improve the performance of the CPU frequency range,
  3. In order to improve the performance of the hard disk and boot time, the watchdog has been disabled by default.
  4. Improving the performance of the hard disk by changing the I/O scheduler for SATA, HDD, and NVMe disks.
  5. Improved CPU performance by changing the default kernel scheduler to a Linux-zen kernel.
  6. Improving network and Internet performance by changing the Bottleneck Bandwidth and Round-trip propagation time (BBR).
  7. Improved RAM memory function by changing the randomize_va_space status.
  8. Improved virtual memory performance by replacing zswap instead of swap by default.
  9. The hardware threads (physical CPU) for each CPU core have been enabled.
  10. Improving the paralleling of tasks by allowing independent tasks (running threads) by sharing some processor resources.
  11. Changed power saving mode to performance mode by default, In order to improve the performance of the disk and network IO.
  12. All CPU governor frequency has switched in performance.
  13. Reducing kernel log-level reports to a low level in order to improve kernel performance increase security and create silent boot mode.
  14. and also, improving TCP performance, increasing inode cache memory, disk cache, improving network and bandwidth parameters, etc.

The predator-OS Linux has its own unique features, which you can see 100 features on the site, and it also has features compared to security distributions, including:

  1. Includes many boot grub parameters both in live and after installation.
  2. Disables many unnecessary services and loggers during the boot-up.
  3. Allows the kernel to automatically proceed without prompting the user for any input.
  4. Improves and includes security features that protect against certain types of attacks.
  5. Improves and includes performance tuning features for low latency behavior of the system.
  6. Automatically detects other operating systems installed on the system and adds them to the GRUB boot menu.
  7. Changes to the calamares installer instead of the default ubiquity installer.
  8. Provides easy installation and better user-friendly tools and environment.
  9. Suitable for newbie users and useful for general work compared to Parrot and Kali distribution.
  10. Includes the best privacy, hardening, anonymous configuration, and tools.
  11. Offers a lighter and smaller download file size, despite having more tools than BlackArch, Tsurugi Linux, and dracOS Linux distributions.
  12. Has the ability to boot both in live mode and for installation, unlike deft, Discreete Linux, despite having all the tools of that distribution.
  13. Includes the feature of booting in safe mode, text-mode, Noacpi, Iommu, forensic mode, and having CLI tools like the dracOS distribution that lacks graphical tools.
  14. Includes all Bugtraq Linux tools.
  15. Includes more web penetration testing tools than Samurai Linux.
  16. Includes more tools than BackBox Linux.
  17. Includes all Pentoo Linux tools.
  18. Includes specialized PC crime detection tools and also the ability to run Windows tools in Linux, such as deft and CAINE Linux.
  19. Includes Kodachi Linux features in the field of privacy and anonymity.
  20. Includes secure and privacy features of Discreete Linux.
  21. Includes all Santoku Linux tools in the field of Mobile pen-testing.
  22. Includes the Whonix distribution features for more security and anonymity.
  23. Includes all Attifyos Linux tools in the field of IoT penetration testing and even more with a user-friendly interface.
  24. Includes all stressLinux tools in the field of stress testing and more.
  25. Includes the features of anonymity on the web, such as IprediaOS distribution.
  26. Includes many tools from the following site: insecure.org.

[Download link](http://predator-os.ir/) ## Default username and password for all iso files:  Username= predator Password = predator

Donate inside Iran:

https://zarinp.al/learninghive.ir

Donate outside Iran:

0xd15e9222ee44349DabFae6F61dD7382617e7A563

Host and Domain Sponsored By:

Providing Linux hosting services, selling SSL certificates, registering and transferring domains, and hosting. [site link](https://www.netafraz.com)

About

The distro is for penetration testing and ethical hacking and also privacy, hardened, secure, anonymized Linux distro.Predator Linux has around 1300 pre-installed tools which are split into 30 several categories.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published