predator-os.ir
Open in
urlscan Pro
212.33.203.187
Public Scan
URL:
https://predator-os.ir/
Submission: On November 01 via api from US — Scanned from DE
Submission: On November 01 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMGET https://predator-os.ir/
<form method="get" id="searchform" action="https://predator-os.ir/">
<i class="icon_search icon-search-fine"></i>
<a href="#" class="icon_close"><i class="icon-cancel-fine"></i></a>
<input type="text" class="field" name="s" placeholder="Enter your search">
<input type="submit" class="display-none" value="">
</form>
Text Content
* Contact me : * info.predator.os@gmail.com * * * * Home * About * Features * Gallery * Download * Tools * Founder * Donate Donate Penetration Testing and Ethical Hacking Harened,and Anonymize Included more than 1200 applications in 40 categories 01 Based on:Debian 12.6 Kernel 6.6 LTS Works on: 10 Different Modes Plasma Desktop Best collection of python 2 and 3 modules, R language and other tools 02 Performanced and tuned speed up kernel and user space Hardened against more attacks Everything that users will need for designing and modeling. 03 What is Predator-os v3.3 - 08-18-2024 POLYMORPHIC SECURITY PLATFORMPOLYMORPHIC SECURITY PLATFORMPOLYMORPHIC SECURITY PLATFORMPOLYMORPHIC SECURITY PLATFORMPOLYMORPHIC SECURITY PLATFORMPOLYMORPHIC SECURITY PLATFORM Polymorphic Security Platform It was developed in 2021 by Hossein Seilani, who is also the developer of https://emperor-os.ir/ Linux. Predator-OS is a free and open-source community project, emphasizing freedom. The distribution is designed for Penetration testing, Ethical hacking, privacy, hardening, and secure, anonymized Linux. Predator Linux is based on Debian Stable, with kernel 6.6.15. Fully customized Plasma desktop with a specialized menu of tools. Predator Linux comes with approximately 1200 pre-installed tools in 40 different categories and 9 modes. These tools have been sourced from both Debian repositories, and GitHub pages. Most kernel and user configurations are customized by default to prevent hacking attempts and non-privileged access and reduce the attack surface. Additionally, numerous built-in firewalls and defensive tools enable end-users to have control over the Predator-OS. Predator also supports various privacy, anonymization, and security tools, and can be run as a live CD or from a USB Drive, as well as in installation mode. Predator-os Video See all Video Top Key Features * Included in more than 500 lists of Red and Blue team tools. * Included in more than 200 lists of AWS cloud tools. * Included in Web3 security tools. * Included in more than 10 sets of roadmaps in cybersecurity. * Included in more than 100 search engines * Included in more than 300 educational scripts * Included in more than 100 security training websites * Included in more than 40 websites for running a cybersecurity lab. * Included in 1000 websites for OSINT (Open * source intelligence). * It is included in more than 11 offline and self-study training categories in cybersecurity. More Features: 1) Includes many boot grub parameters both in live and after installation. 2) Disables many unnecessary services and loggers during the boot-up. 3) Allows the kernel to automatically proceed without prompting the user for any input. 4) Improves and includes security features that protect against certain types of attacks. 5) Improves and includes performance tuning features for low latency behavior of the system. 6) Automatically detects other operating systems installed on the system and adds them to the GRUB boot menu. 7) Changes to the calamares installer instead of the default ubiquity installer. 8) Provides easy installation and better user-friendly tools and environment. 9) Suitable for newbie users and useful for general work compared to Parrot and Kali distribution. 10) Includes the best privacy, hardening, anonymous configuration, and tools. 11) Offers a lighter and smaller download file size, despite having more tools than BlackArch, Tsurugi Linux, and dracOS Linux distributions. 12) Has the ability to boot both in live mode and for installation, unlike deft, Discreete Linux, despite having all the tools of that distribution. 13) Includes the feature of booting in safe-mode, text-mode, Noacpi, Iommu, forensic-mode, and having CLI tools like the dracOS distribution that lacks graphical tools. 14) Includes all Bugtraq Linux tools. 15) Includes more web penetration testing tools than Samurai Linux. 16) Includes more tools than BackBox Linux. 17) Includes all Pentoo Linux tools. 18) Includes specialized PC crime detection tools and also the ability to run Windows tools in Linux, such as deft and CAINE Linux. 19) Includes Kodachi Linux features in the field of privacy and anonymity. 20) Includes secure and privacy features of Discreete Linux. 21) Includes all Santoku Linux tools in the field of Mobile pentesting. 22) Includes the Whonix distribution features for more security and anonymity. 23) Includes all Attifyos Linux tools in the field of IoT penetration testing and even more with a user-friendly interface. 24) Includes all stressLinux tools in the field of stress testing and more. 25) Includes the features of anonymity on the web, such as IprediaOS distribution. 26) Includes many tools from the following site: insecure.org. Predator-os Books PREDATOR-OS GUIDE BOOK BEGINNER EDITION This book reviews and introduces the Predator-os Linux’s features, environment, and tools. PREDATOR-OS SOURCE CODE BOOK ADVANCE EDITION This book provides advanced Linux configuration in penetration testing, hardening, privacy, anonymity, security, and tuning performance of the Predator-os Linux. Download Books Image Gallery see gallery DEFAULT USERNAME:USER DEFAULT PASSWORD:USER DEFAULT USERNAME:ROOT DEFAULT PASSWORD:USER DONATE INSIDE IRAN https://zarinp.al/learninghive.ir DONATE OUTSIDE IRAN Tether: 0xd15e9222ee44349DabFae6F61dD7382617e7A563 Categories of tools Predator Linux has around 1200 pre–installed tools which are split into 40 several categories. Predator Tools are imported from both Debian and Ubuntu repositories and GitHub page. Although, Predator–OS is multipurpose and works in 9 different security modes. see All Tools Founder and Developer I am Hossein Seilani, M.S. in Computer Science, and the founder and developer of Emperor-OS, Little-Psycho, and Predator-OS Linux. I have experience and certifications in various domains, including Linux/Windows Sysadmin, UX/UI, Front-End web design, SEO, Graphic Designer, Data Science, and machine learning. All About me web hosting and domain sponsorship by netafraz company. Netafraz website my other distro Links These are another distro that I developed. EMPEROR-OS It has more than 500 applications in 20 categories for programming, graphic design, and data science.Comes in 64-bit ISO and has 10 desktops. see Website v2.5 LITTLE-PSYCHO It is lives CD with a KDE plasma.t is a Dangerous, Wild, Destructive, changer, stress testing, system, and resilience testing Linux for hardware and software. see Website v 3.0 HUBUNTU It is hardened Ubuntu that secure for sensisensitive desktop user and environments.Based on Ubuntu 18-20-22-24 LTS. see Website LTS ARTYSTONE It is a desktop distro especially highly customized for general usage.Based on Debian,Ubuntu and Arch.with more features. see Website v 1.0 CONTACT AND CONTRIBUTE TO ME TELEGRAM @SEILANY GITHUB HTTPS://GITHUB.COM/HOSSEINSEILANI/ YOUTUBE HTTPS://WWW.YOUTUBE.COM/@PREDATOR-OS5453 EMAIL INFO.PREDATOR-OS@GMAIL.COM LINKEDIN HTTPS://WWW.LINKEDIN.COM/IN/HOSSEIN-SEILANI PINTEREST HTTPS://WWW.PINTEREST.COM/HOSSEINSEILANII/ TELEGRAM GROUP HTTPS://T.ME/+SSWIUCXO65O0NTG0 ALL ABOUT ME https://seilany.ir/ Hossein Seilani @ 2023 * * * Donate * * *