predator-os.ir Open in urlscan Pro
212.33.203.187  Public Scan

URL: https://predator-os.ir/
Submission: On November 01 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://predator-os.ir/

<form method="get" id="searchform" action="https://predator-os.ir/">
  <i class="icon_search icon-search-fine"></i>
  <a href="#" class="icon_close"><i class="icon-cancel-fine"></i></a>
  <input type="text" class="field" name="s" placeholder="Enter your search">
  <input type="submit" class="display-none" value="">
</form>

Text Content

 * Contact me :
 * info.predator.os@gmail.com

 * 
 * 
 * 


 * Home
 * About
 * Features
 * Gallery

 * Download
 * Tools
 * Founder
 * Donate




Donate

Penetration Testing and
Ethical Hacking
Harened,and Anonymize Included more than 1200 applications in 40 categories 01
Based on:Debian 12.6
Kernel 6.6 LTS
Works on: 10 Different Modes
Plasma Desktop Best collection of python 2 and 3 modules, R language and other
tools 02 Performanced and tuned
speed up kernel and user space
Hardened against more attacks Everything that users will need for designing and
modeling. 03

What is Predator-os v3.3 - 08-18-2024


POLYMORPHIC SECURITY PLATFORMPOLYMORPHIC SECURITY PLATFORMPOLYMORPHIC SECURITY
PLATFORMPOLYMORPHIC SECURITY PLATFORMPOLYMORPHIC SECURITY PLATFORMPOLYMORPHIC
SECURITY PLATFORM

Polymorphic Security Platform
It was developed in 2021 by Hossein Seilani, who is also the developer of
https://emperor-os.ir/ Linux. Predator-OS is a free and open-source community
project, emphasizing freedom. The distribution is designed for Penetration
testing, Ethical hacking, privacy, hardening, and secure, anonymized Linux.
Predator Linux is based on Debian Stable, with kernel 6.6.15. Fully customized
Plasma desktop with a specialized menu of tools.
 
Predator Linux comes with approximately 1200 pre-installed tools in 40 different
categories and 9 modes. These tools have been sourced from both Debian
repositories, and GitHub pages. Most kernel and user configurations are
customized by default to prevent hacking attempts and non-privileged access and
reduce the attack surface. Additionally, numerous built-in firewalls and
defensive tools enable end-users to have control over the Predator-OS. Predator
also supports various privacy, anonymization, and security tools, and can be run
as a live CD or from a USB Drive, as well as in installation mode.

Predator-os Video

See all Video


Top Key Features

 * Included in more than 500 lists of Red and Blue team tools.
 * Included in more than 200 lists of AWS cloud tools.
 * Included in Web3 security tools.
 * Included in more than 10 sets of roadmaps in cybersecurity.
 * Included in more than 100 search engines
 * Included in more than 300 educational scripts
 * Included in more than 100 security training websites 
 * Included in more than 40 websites for running a cybersecurity lab.
 * Included in 1000 websites for OSINT (Open
 * source intelligence).
 * It is included in more than 11 offline and self-study training categories in
   cybersecurity.

More Features:

1) Includes many boot grub parameters both in live and after installation.

2) Disables many unnecessary services and loggers during the boot-up.

3) Allows the kernel to automatically proceed without prompting the user for any
input.

4) Improves and includes security features that protect against certain types of
attacks.

5) Improves and includes performance tuning features for low latency behavior of
the system.

6) Automatically detects other operating systems installed on the system and
adds them to the GRUB boot menu.

7) Changes to the calamares installer instead of the default ubiquity installer.

8) Provides easy installation and better user-friendly tools and environment.

9) Suitable for newbie users and useful for general work compared to Parrot and
Kali distribution.

10) Includes the best privacy, hardening, anonymous configuration, and tools.

11) Offers a lighter and smaller download file size, despite having more tools
than BlackArch, Tsurugi Linux, and dracOS Linux distributions.

12) Has the ability to boot both in live mode and for installation, unlike deft,
Discreete Linux, despite having all the tools of that distribution.

13) Includes the feature of booting in safe-mode, text-mode, Noacpi, Iommu,
forensic-mode, and having CLI tools like the dracOS distribution that lacks
graphical tools.

14) Includes all Bugtraq Linux tools.

15) Includes more web penetration testing tools than Samurai Linux.

16) Includes more tools than BackBox Linux.

17) Includes all Pentoo Linux tools.

18) Includes specialized PC crime detection tools and also the ability to run
Windows tools in Linux, such as deft and CAINE Linux.

19) Includes Kodachi Linux features in the field of privacy and anonymity.

20) Includes secure and privacy features of Discreete Linux.

21) Includes all Santoku Linux tools in the field of Mobile pentesting.

22) Includes the Whonix distribution features for more security and anonymity.

23) Includes all Attifyos Linux tools in the field of IoT penetration testing
and even more with a user-friendly interface.

24) Includes all stressLinux tools in the field of stress testing and more.

25) Includes the features of anonymity on the web, such as IprediaOS
distribution.

26) Includes many tools from the following site: insecure.org.

Predator-os Books

PREDATOR-OS GUIDE BOOK

BEGINNER EDITION

This book reviews and introduces the Predator-os Linux’s features, environment,
and tools.

PREDATOR-OS SOURCE CODE BOOK

ADVANCE EDITION

This book provides advanced Linux configuration in penetration testing,
hardening, privacy, anonymity, security, and tuning performance of the
Predator-os Linux.

Download Books

Image Gallery

see gallery

DEFAULT USERNAME:USER

DEFAULT PASSWORD:USER

DEFAULT USERNAME:ROOT

DEFAULT PASSWORD:USER




DONATE INSIDE IRAN

https://zarinp.al/learninghive.ir


DONATE OUTSIDE IRAN

Tether:
0xd15e9222ee44349DabFae6F61dD7382617e7A563



Categories of tools

Predator Linux has around 1200 pre–installed tools which are split into 40
several categories. Predator Tools are imported from both Debian and Ubuntu
repositories and GitHub page. Although, Predator–OS is multipurpose and works in
9 different security modes.

see All Tools


Founder and Developer

I am Hossein Seilani, M.S. in Computer Science, and the founder and developer of
Emperor-OS, Little-Psycho, and Predator-OS Linux. I have experience and
certifications in various domains, including Linux/Windows Sysadmin, UX/UI,
Front-End web design, SEO, Graphic Designer, Data Science, and machine learning.

All About me

web hosting and domain sponsorship by netafraz company.
Netafraz website



my other distro Links

These are another distro that I developed.


EMPEROR-OS

It has more than 500 applications in 20 categories for programming, graphic
design, and data science.Comes in 64-bit ISO and has 10  desktops.
see Website
v2.5


LITTLE-PSYCHO

It is lives CD with a KDE plasma.t is a Dangerous, Wild, Destructive, changer,
stress testing, system, and resilience testing Linux for hardware and software.
see Website
v 3.0


HUBUNTU

It is hardened Ubuntu that secure for sensisensitive desktop user and
environments.Based on Ubuntu 18-20-22-24 LTS.


see Website
LTS


ARTYSTONE

It is a desktop distro especially highly customized for general usage.Based on
Debian,Ubuntu and Arch.with more features.


see Website
v 1.0


CONTACT AND CONTRIBUTE TO ME


TELEGRAM

@SEILANY


GITHUB

HTTPS://GITHUB.COM/HOSSEINSEILANI/


YOUTUBE

HTTPS://WWW.YOUTUBE.COM/@PREDATOR-OS5453


EMAIL

INFO.PREDATOR-OS@GMAIL.COM 


LINKEDIN

HTTPS://WWW.LINKEDIN.COM/IN/HOSSEIN-SEILANI


PINTEREST

HTTPS://WWW.PINTEREST.COM/HOSSEINSEILANII/


TELEGRAM GROUP

HTTPS://T.ME/+SSWIUCXO65O0NTG0



ALL ABOUT ME

https://seilany.ir/


Hossein Seilani @ 2023
 * 
 * 
 * 

Donate



 * 
 * 
 *