Predator is a GNU/Linux distribution. It is based on Debian stable. It is a complete operating system for Cybersecurity users and environments. Including software and systems for installation and management all based on the Linux kernel and free software. When I created Predator-OS, in 2021, I sought to have two principal features. First, performance and more security. It would also be a non-commercial distribution. I focused on the predator to be a polymorphic security platform for beginners and professional users and for academics and universities.
Remember that hackers are big people. Those who create valuable things and build the world. On the other side, there are crackers who only lose money. We have a lot of respect for real hackers. Those who usually hide in the shadows and whose names are rarely heard.
Predator-OS is a good choice for those who love security. This distribution has a great advantage over its competitors and has an easy and attractive user interface. Even if you are not familiar with Linux, you will feel good about this distribution. He is well-versed in the philosophy of open source and has applied this point in his development process. There are many open-source tools in this operating system for database analysis. Wireshark provides network packet analysis tools for analyzing information in networks, Bluetooth, wireless networks, databases, forensics, and more. Predator has been in development since 2021. This operating system supports a 64-bit platform. You can test Predator before installing it on live. It uses the PLASMA desktop by default and is released under the GPL general license.
You install Kali Linux; but after installing it, you realize that it is hardly usable. Despite the advanced Kali kernel, the network cards and mouse don’t work well after installation, and the heavy NVIDIA graphics card and GPU lack properly installed drivers. In Kali Live mode, it indicates that these advanced drivers have not reached the core yet.
This is especially true for those who are drawn to the security field, whether it’s a hobby, a hobby, or a line of work.
By observing these problems among users, we realized that we could guide users into the world of security by creating a more structured and user-friendly Linux distribution. Helping our community while simplifying all the complexities of Linux.
Predator-OS Linux provide a polymorphic security platform for systems and network administrators, security experts, digital forensics operations and cybersecurity engineers. It was focused on Pentesting, Ethical Hacking, Secure, Privacy, Hardened and Anonymized Linux.
The Predator-OS is available in edition security now. With other editions such as Desktop, IOT, mobile, Virtual machine, Raspberry Pi and Docker being released soon.
The default Desktop is PLASMA but the other Desktops such as KDE plasma, Mate, Gnome will be released soon. The system is designed to be familiar for the security expert and is easy to use for the new entry student; but it does not try to hide its internals, as other generalpurpose distributions try to do.
The Predator-OS Linux has its own unique features, which you can see 100 features on the site, and it also has features compared to security distributions, including:
Easy installation and better hardware support than Kali distribution
Suitable for newbies users and useful for general work compared to Parrot and Kali distribution
Included all Parrot Linux tools
Lighter and lower download file size despite the tools More than the Black Arch distribution
Ability to boot live and also installation, compared to the deft Linux despite having all the tools of this distribution
included the feature of booting in text mode and having CLI tools such as the dracOS distribution that It lacks graphical tools.
Covers all Bugtraq Linux tools
Included More web penetration testing tools than Samurai Linux
Included More tools than BackBox Linux
Included all Pentoo Linux tools
Included specialized PC crime detection tools and Also the ability to run
Windows tools in Linux, such as deft and CAINE Linux
Included Kodachi Linux features in the field of privacy and anonymity
Included secure and privacy features of Discreete Linux
Included all Santoku Linux tools in the field of Mobile pentesting
Included the Whonix distribution features for more security
Included all Attifyos Linux tools in the field of IoT penetration testing and even more with user-friendly interface
Included all stressLinux tools in the field of stress testing and more
Included the Features of anonymity on the web such as IprediaOS distribution
Cover many of the tools of the following site: insecure.org
Included to more than 2 TB password list.
Included to more than 500 lists of the red and blue team tools.
Included to more than 200 lists of AWS-cloud tools.
Included to more than 10 sets of roadmaps in cybersecurity
Included to more than 100 search engines in security and penetration testing 6) Included to more than 300 educational scripts in security and penetration testing
Included to more than 100 security training websites and penetration testing for kids.
Included to more than 10 tools for running cybersecurity lab and penetration testing 9) Included to more than 40 websites for running a lab in cybersecurity testing. 10) Included to the source of 800 Malware files in 80 different groups (400 MB file) 11) Included to 1000 websites for OSINT.
Included to more than 70 online and self-reading websites in cybersecurity.
Included to more than 11 offline and self-study training categories in cybersecurity.
Included to 600 forensic and reverse engineering tools.
Included to more than 6000 Google dorks and exploits as offline
More details:
1)Included to more than 2 TB password list.
Included to more than 300 educational scripts in security and penetration testing.
Included to more than 100 security training websites and penetration testing for kids.
Included to 1000 websites for OSINT.
Included to more than 70 online and self-reading websites in cybersecurity.
Included to 600 forensic and reverse engineering tools.
In order to improve the performance of the CPU frequency range has been changed intel_pstate to acpi-cpufreq by default.
The BIOS frequency limitation has been disabled by default in order to improve the performance of the CPU frequency range,
3)In order to improve the performance of the hard disk and boot time, the watchdog has been disabled by default.
Improving the performance of the hard disk by changing the I/O scheduler for SATA, HDD, and NVMe disks.
Improved CPU performance by changing the default kernel scheduler to a Linuxzen kernel.
Improving network and Internet performance by changing the Bottleneck Bandwidth and Round-trip propagation time (BBR).
Improved RAM memory function by changing the randomize_va_space status. 8) Improved virtual memory performance by replacing zswap instead of swap by default.
9) The hardware threads (physical CPU) for each CPU core have been enabled. 10) Improving the paralleling of tasks by allowing independent tasks (running threads) by sharing some processor resources.
11) Changed power saving mode to performance mode by default, In order to improve the performance of the disk and network IO. 12) All CPU governor frequency has switched in performance.
Reducing kernel log-level reports to a low level in order to improve kernel performance and increase security and create silent boot mode.
and also, improving TCP performance, increasing inode cache memory, disk cache, improving network and bandwidth parameters, etc.
The Predator-OS has 10 different modes and operates at the following modes for easy and faster access to all tools and it also is possible to change Linux Predator at: defensive, offensive, privacy, hardened, secured, settings and pretesting modes quickly.
Predator-OS Linux started in 2021, initially it was supposed to be a privacy and anonymous Linux. It was due to the many problems users reported in the use of other Linux distributions in the field of security and the stopping of many distributions, this distribution was created.
At first, it was decided to make Predator-OS based on Debian. But due to having pre-installed security tools; as well as Debian being a rolling release, the distribution would have many updates and upgrades. And for this issue, I created the distribution in the fix release, so that updates can be done periodically. The best option for Debian stable distribution was the LTS version, which is known for its quality, stability, and wide selection of available software.
The first version of Predator-OS (version 1.0) was released nine months later after some issues and was based on the Debian stable Mini 18.04 at the time. In that first year of development, the focus was on security, privacy, anonymous distribution along with penetration testing tools.
After version 1.0, Predator-OS releases an update annually with new features and improved hardware support. I considered the PLASMA desktop for it because of its simplicity and speed, as well as better customization than other desktops. In version, 2 of the Predator-OS distribution, about 25 new features were released that switched from Debian stable 18.04 to 20.04.
In version 2, many things were considered, both in distribution optimization, turning, and tools.
I was trying to create a distribution with the best performance in several working modes in the field of security, which can cover all cases according to the extent of security. Finally, I created mods for the Predator-OS and it now works in 9 modes.
In version 2.5 of this distribution, it was released with 50 modifications and new features. Most of the focus of version 2.5 was on performance.
In version 3, the distribution will be towards artificial intelligence and the use of intelligent defense mechanisms in attack and defense mode.
Debian stable is open-source software that was developed by Canonical in October 2004. Debian stable is a Linux-based operating system. It is designed for computers, smartphones, and network servers. A UK based company called Canonical Ltd. develops the system. All the principles used to develop the Debian stable.
It is a fixed-release distribution based on Debian stable mini 22.04.3 with the PLASMA desktop and kernel 5.18 LTS. A Polymorphic Security Platform that be able to run as live medium and you can install it on hard disk.
LTS option allows users to stick with a particular version for an extended period of the software without worrying about the quality degrading due to technical issues or security vulnerabilities. LTS releases are more secure, stable, and hence reliable. In addition, all LTS releases get software updates and standard support for up to five years from the Canonical team. For servers, software development PCs, and other critical systems, it is highly recommended that you use the LTS version.
Another edition of rolling release is available that is use daily build source list.
Predator-OS Linux is released with new update and features every year on the first day of the year.
Predator-OS Version
Code name base Debian stable
Release date
Based on
3.1
Debian bookworm
2024-04-04
Debian Stable bookworm
3.0
jammy
2023-11-01
ubuntu stable 22.04 LTS (jammy)
2.5
Focal Fossa
2023-01-01
ubuntu stable 20.04 LTS (Focal Fossa)
2.0
Cosmic Cuttlefish
2022-01-01
ubuntu stable 18.10 (Cosmic Cuttlefish)
1.0
Bionic Beaver
2021-01-01
ubuntu stable 18.04 LTS (Bionic Beaver)
Currently, it officially supports amd64 hardware release architectures. I will release ARM architecture soon. Furthermore, with more than 1300 packages, the pre-installed software can meet almost any need, whether at home or in the enterprise.
When you boot up Predator-OS, you will quickly notice that a security learning process into a variety of different contexts and activities organizes the main menu. Predator Linux has neat 1000 pre-installed tools for cybersecurity and pentesting, and also system administrators. These tools are split into 40 categories.
The predator Linux kernel has been recompiled and tuned as much as possible to optimize the system, secure, hardened and anonymous it and have the latest patches and hardware support and firmware.
In order to improve the performance of the CPU frequency range has been changed intel_pstate to acpi-cpufreq by default.
The BIOS frequency limitation has been disabled by default in order to improve the performance of the CPU frequency range,
3)In order to improve the performance of the hard disk and boot time, the watchdog has been disabled by default.
Improving the performance of the hard disk by changing the I/O scheduler for SATA, HDD, and NVMe disks.
Improved CPU performance by changing the default kernel scheduler to a Linux-zen kernel. 6) Improving network and Internet performance by changing the Bottleneck Bandwidth and Roundtrip propagation time (BBR).
Improved RAM memory function by changing the randomize_va_space status.
Improved virtual memory performance by replacing zswap instead of swap by default.
The hardware threads (physical CPU) for each CPU core have been enabled.
Improving the paralleling of tasks by allowing independent tasks (running threads) by sharing some processor resources.
Changed power saving mode to performance mode by default, in order to improve the performance of the disk and network IO.
All CPU governor frequency has switched in performance.
Reducing kernel log-level reports to a low level in order to improve kernel performance and increase security and create silent boot mode.
and also, improving TCP performance, increasing inode cache memory, disk cache, improving network and bandwidth parameters, etc.
The Predator-OS has been designed and developed by Hossein seilani who is the developer of Emperor-OS Linux too. And the website and documents are designed by him as well.
He is originally from Iran.
Most important news about Predator-OS:
Predator-OS Linux is only compatible with 64-bit processors.
Recommended system requirements:
2 GHz dual-core processor or better
4 GB system memory
25 GB of free hard drive space
Internet access is helpful
Either a DVD drive or a USB port for the installer media
You can run predator-so on live mode and you will have all features of it in live mode.