# Introduction

![](https://1209410422-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeghnpTQ7npkdA7nmIC2s%2Fuploads%2FdyQuFIw9fIGAYCdbo6Gp%2F0.png?alt=media)

**Predator-OS Linux**

**User Guide**

### Polymorphic Security Platform <a href="#toc171119832" id="toc171119832"></a>

A security-centric free open-source Linux

Penetration testing and Ethical hacking and can be use it a&#x73;**:** privac&#x79;**,** hardene&#x64;**,** secur&#x65;**,** anonymized

By[ **hossein seilani**](https://github.com/hosseinseilani/)

(2024)

### Preface <a href="#toc171119833" id="toc171119833"></a>

It was developed in 202&#x31;**,** by [**Hossein Seilani** ](http://seilany.ir/)who is also the developer of [**https://emperor-os.ir/** ](https://emperor-os.ir/)Linux to&#x6F;**.** The Predato&#x72;**-**&#x4F;S is a free ope&#x6E;**-**&#x73;ource community projec&#x74;**,** Free **(**&#x61;s in freedo&#x6D;**).** The distro is for penetration testing and ethical hacking and also privac&#x79;**,** hardene&#x64;**,** secur&#x65;**,** anonymized Linu&#x78;**.** Predator Linux is based on Debia&#x6E;**,** kernel &#x36;**.**&#x36; LTS **and** &#x36;**.**&#x31; LTS and using a fully customized plasma desktop with a special menu of tool&#x73;**.**

Predator Linux has around 1300 pr&#x65;**-**&#x69;nstalled tools, which are split into 40 several categorie&#x73;**.** Predator Tools are imported from both Debian and Debian stable repositories and GitHub pag&#x65;**.** Most kernel and user configs are customized by default to prevent any hackin&#x67;**,** no&#x6E;**-**&#x70;rivileged access and reduce the attack surfac&#x65;**.** Many buil&#x74;**-**&#x69;n firewalls and defensive tools allow en&#x64;**-**&#x75;sers to control the Predato&#x72;**-**&#x4F;&#x53;**.** Predator also supports much privac&#x79;**,** anonymize&#x64;**,** security tool&#x73;**,** and also both it to be run as Liv&#x65;**-**&#x43;D or from a USB Drive and installation mod&#x65;**.**

![](https://1209410422-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeghnpTQ7npkdA7nmIC2s%2Fuploads%2FuK330U3tgf7g8KhVB7se%2F1.png?alt=media)

### Details <a href="#toc171119834" id="toc171119834"></a>

* OS Typ&#x65;**:** Linux
* Based o&#x6E;**:** Debian Stable
* Kerne&#x6C;**:** 6.6
* Origi&#x6E;**:**[ Empero&#x72;**-**&#x6F;s ](http://www.emperor-os.ir/)Team **,** Iran
* Deskto&#x70;**:** Plasma
* Other Deskto&#x70;**:** as soon as possible
* Categor&#x79;**:** penetration testin&#x67;**,** securit&#x79;**,** privac&#x79;**,** Forensic&#x73;**,** Live Mediu&#x6D;**,** hardene&#x64;**,** anonymized

### Downloading a Predator-OS ISO Image <a href="#toc171119835" id="toc171119835"></a>

### Where to Download <a href="#toc171119836" id="toc171119836"></a>

<https://www.seilany.ir/predator-os/download/Predator-OS-v3.1-amd64-26-06-2024.iso>

### Why this book? <a href="#toc171119837" id="toc171119837"></a>

Predato&#x72;**-**&#x4F;S Linux is not built to be a simple set of tool&#x73;**,** but rather a flexibl&#x65;**,** Polymorphic security platform that professional penetration tester&#x73;**,** security enthusiast&#x73;**,** student&#x73;**,** and amateurs can customize to suit their specific need&#x73;**.** Als&#x6F;**,** the Linux Predato&#x72;**-**&#x4F;S is not just a collection of various information security tools pr&#x65;**-**&#x63;onfigured to prepare yo&#x75;**.** To get the most out of Predato&#x72;**,** i&#x74;**’**&#x73; important to have a solid understanding of Linux and how to use them in your environmen&#x74;**.**

Althoug&#x68;**,** Predato&#x72;**-**&#x4F;S is multipurpose and works in 10 different security mode&#x73;**.** But it is primarily designed to help with penetration testin&#x67;**.** Als&#x6F;**,** this book is not only to help you when using Linux Predato&#x72;**-**&#x4F;&#x53;**,** but also to improve your understanding and simplify your experience so that when you are involved in a penetration tes&#x74;**.** You do&#x6E;**’**&#x74; have to worry about losing precious minutes to install new software or new settings or activate a new network servic&#x65;**.** In this boo&#x6B;**,** first you will be introduced to Linu&#x78;**,** then you will get to know Predato&#x72;**-**&#x4F;S in more detai&#x6C;**.**

This book will help to better understand this operating system and is intended to help both beginners and professional Linux user&#x73;**,** as well as users who are looking to deepen their knowledge about security setting&#x73;**.** In additio&#x6E;**,** this book can be used as a road ma&#x70;**,** or a training reference on Linux operating system configuration and security setting&#x73;**.**

This book is designed so that you can focus on Linux Predator right from the star&#x74;**.**
