# Chapter 13

![](https://1209410422-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeghnpTQ7npkdA7nmIC2s%2Fuploads%2F1fFshoYwqvwcinBz8Xl9%2F0.jpeg?alt=media)

### Chapter 13 <a href="#toc171120227" id="toc171120227"></a>

### All 100 features <a href="#toc171120228" id="toc171120228"></a>

**All 100 Features**

**Features 1-10**

&#x31;**.**&#x73;ecurit&#x79;**-**&#x6F;riented Linux distribution

**-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-**

eas&#x79;**-**&#x74;&#x6F;**-**&#x69;nstall and pr&#x65;**-**&#x63;onfigured system featuring

&#x32;**.**&#x50;lasma as the default desktop environment

**-----------------------------------------------------**

Fully Customization Desktop and menu

&#x33;**.**&#x4F;perates at 9 several differnt modes

**-----------------------------------------------------**

Privac&#x79;**,** Secur&#x65;**,** Hardene&#x64;**,** Anonymize&#x64;**,** Tutoria&#x6C;**,** Defensiv&#x65;**,** Offensiv&#x65;**,** Monitorin&#x67;**,** Emergency

&#x34;**.**&#x55;pdate Manager Tools

**-----------------------------------------------------**

kernel and tools update manage&#x72;**,** Update notifications can notify the user if their system is becoming out of date

&#x35;**.**&#x63;ollection of security tools

Predator Linux has around 1300 pr&#x65;**-**&#x69;nstalled tools which are split into 40 categories

&#x36;**.**&#x47;raphical boot system and logger

**-----------------------------------------------------**

OS has a plymouth and you can press arrow key to see the console messege

&#x37;**.**&#x4C;ive Mode by defaul&#x74;**,** Live DVD Live USB

**-----------------------------------------------------** Als&#x6F;**,** You can run the installer and install it

&#x38;**.**&#x50;lasm&#x61;**-**&#x50;anel

**-----------------------------------------------------**

Application launcher&#x73;**,** menu&#x73;**,** a workspace switcher and more plugins

&#x39;**.**&#x55;launcher

**-----------------------------------------------------**

It very easy to find and launch your file&#x73;**,** quickly open website&#x73;**,** find programs to ope&#x6E;**,** calculate math problem&#x73;**,** and more

1&#x30;**.**&#x43;ustomized Menu

**-----------------------------------------------------**

Os Allows easy and fast access to all pr&#x65;**-**&#x69;nstalled ap&#x70;**,** organised into 40 categories

**Features 11-20**

1&#x31;**.**&#x54;erminal in Desktop Background

**-----------------------------------------------------**

highly configureable Graphica&#x6C;**,** Always be open and running in desktop background

1&#x32;**.**&#x64;isabled suspen&#x64;**,** Hibernat&#x65;**,** sleep

**-----------------------------------------------------**

Because of prevent access to the entire memory dump and private dat&#x61;**,** password&#x73;**,** keys

security threat

1&#x33;**.**&#x50;rivacy Tools

**-----------------------------------------------------**

PrivacyTools provides service&#x73;**,** tools and knowledge to protect your privacy against global mass surveillanc&#x65;**.**

1&#x34;**.**&#x66;ully OSINT Framword

**-----------------------------------------------------**

Focused on gathering information from free tools or resources

1&#x35;**.**&#x42;ug Bounty Tools

Give users the ability to harness a large group of hackers in order to find bugs in their cod&#x65;**.**

1&#x36;**.**&#x49;ncluded Cyber Search Engine

**-----------------------------------------------------**

Private Search Engines with popular features and latest links

1&#x37;**.**&#x43;TF Tools

**-----------------------------------------------------**

Running a capture the flag **(**&#x43;T&#x46;**)** competitio&#x6E;**,** Tools used for solving CTF challenges

1&#x38;**.**&#x50;enetration Testing Labrator

**-----------------------------------------------------**

There are many tools to learn the practical side of vulnerability assessments and virtual space to test malwares

1&#x39;**.**&#x4D;ost Scaner Drivers

**-----------------------------------------------------**

More than 2500 scaner devices supported by sane package

2&#x30;**.**&#x50;rivac&#x79;**-**&#x65;nhanced browsers

**-----------------------------------------------------**

privacy focused browse&#x72;**,**&#x73;hields FOR privac&#x79;**,**&#x42;locking harmful ads

**Features 21-30**

2&#x31;**.**&#x53;ecure Group Chat Tools

**-----------------------------------------------------**

included secure messaging ap&#x70;**.** En&#x64;**-**&#x74;&#x6F;**-**&#x65;nd encryptio&#x6E;**,** mult&#x69;**-**&#x6D;ode messagin&#x67;**,**&#x4D;ult&#x69;**-**&#x70;latform support

2&#x32;**.**&#x73;el&#x66;**-**&#x64;estruct Tool

**-----------------------------------------------------**

Clean Every Log&#x73;**,** track&#x73;**,**&#x6D;emor&#x79;**,**&#x63;ache and fast Shutdown PC security threat

2&#x33;**.**&#x56;PN Tools

**-----------------------------------------------------**

secure all data communications and extend private networ&#x6B;**.**&#x73;ecurely access corporate network through an encrypted connection

2&#x34;**.**&#x53;mart and use&#x72;**-**&#x66;riendly SHELL

**----------------------------------------------------**&#x49;ncluded zsh and fish shell

2&#x35;**.**&#x49;ncluded ID&#x53;**/**&#x49;PS Tools

**-----------------------------------------------------**

Antiviru&#x73;**,**&#x54;rojan Remove&#x72;**,** malware Detectio&#x6E;**,** apparmor&#x65;**,**&#x41;ID&#x45;**,** SElinux and Firewalls

2&#x36;**.**&#x49;ntegrity Check Tools

**-----------------------------------------------------**

Included tools to compare state of stored data and file integrity monitoring

2&#x37;**.**&#x41;pparmor Profiles

**-----------------------------------------------------**

Installed and enabled all available apparmor profiles

2&#x38;**.**&#x49;ncluded USB Guard Tools

**-----------------------------------------------------**

Prevent from US&#x42;**,** physical access and Electrical attacks

2&#x39;**.**&#x49;ncluded Tune utility

**-----------------------------------------------------**

The tuned comman&#x64;**-**&#x6C;ine tool allows users to switch between different tuning profile&#x73;**.**

3&#x30;**.**&#x52;eal time monitoring Tool

**-----------------------------------------------------**

Monitoring and troubleshooting everything in real time for free with Netdata Features 3&#x31;**-**&#x34;0

3&#x31;**.**&#x47;oogle Hacking Database

**-----------------------------------------------------** You can access to more than 6 entries

3&#x32;**.**&#x63;ontroling All services

**-----------------------------------------------------**

included Stacer tool to controling all services beside the systemctl cli

3&#x33;**.**&#x52;emoving Unnecessary data

**-----------------------------------------------------**

Removing Unnecessary service&#x73;**,** package&#x73;**,** startup files and configs

3&#x34;**.**&#x64;isabled the \[Ctrl]**-**\[Alt]**-**\[Delete]

**-----------------------------------------------------**

Disallow anyone to reboot the OS using Ctr&#x6C;**-**&#x41;l&#x74;**-**&#x44;el key&#x73;**.**

3&#x35;**.**&#x49;ncluded Database Tools

**-----------------------------------------------------** included the most useful database management tools

3&#x36;**.**&#x49;ncluded Audit Tools

**-----------------------------------------------------**

Included Security Audit and Intrusion Detection Too&#x6C;**:** tige&#x72;**,**&#x6C;ynis and more tools

3&#x37;**.**&#x69;ncluded Mix Networks protocols

**-----------------------------------------------------**

Har&#x64;**-**&#x74;&#x6F;**-**&#x74;race communication&#x73;**,** by encrypting and keep you anonymous onlin&#x65;**.**&#x73;uch as i2&#x70;**,**&#x54;o&#x72;**,**&#x4F;penVP&#x4E;**,**&#x4C;antern

3&#x38;**.**&#x49;ncluded osquery

**-----------------------------------------------------**

Allows you to craft your system queries using SQL statements to troubleshoot performance and operational issues

3&#x39;**.**&#x49;ncluded log management tools

**-----------------------------------------------------**

Managing and analyzing log file&#x73;**,** record system activit&#x79;**,** events and report generation tools

4&#x30;**.**&#x70;assword lists

**-----------------------------------------------------**

Access to 300 GB password list contains every wordlis&#x74;**,** dictionar&#x79;**,** and password database leak

**Features 41-50**

4&#x31;**.**&#x69;ncluded wipe tools

**-----------------------------------------------------**

fully erase data from hard driv&#x65;**,** memor&#x79;**,** rewrites the sector and flushes the cache

4&#x32;**.**&#x49;ncluded Virtual Keyboard

**-----------------------------------------------------**

Florence is an open source extensible scalable virtual keyboard

4&#x33;**.**&#x4D;alware Analysis Toolkit

**-----------------------------------------------------**

included Toolkit for revers&#x65;**-**&#x65;ngineering and analyzing Windows and Linux maliciou&#x73;**,**&#x46;orensic investigators

4&#x34;**.**&#x4D;achine Learning for Cybersecurity

**-----------------------------------------------------**

included python2 and 3 modules for InfoSe&#x63;**,** malware analysi&#x73;**,**&#x63;yber security and Machine Learning

4&#x35;**.**&#x53;el&#x66;**-**&#x64;ocument of tools

**-----------------------------------------------------**

Describes the application with extra lines as a tools toolti&#x70;**.**

4&#x36;**.** package managers

**-----------------------------------------------------**

Included ap&#x74;**,** aptitud&#x65;**,** alie&#x6E;**,** synapti&#x63;**,** dpk&#x67;**,** snap

4&#x37;**.**&#x4B;ernel tuning

**-----------------------------------------------------**

included Kernel tuning configurations such as high cache pressur&#x65;**,**&#x74;uned performance profile

4&#x38;**.**&#x49;ncluded cpupower Tools

**-----------------------------------------------------**

Included collection of tools to examine and tune power saving related features of your processo&#x72;**.**

4&#x39;**.**&#x44;ata Recovery Tools

**-----------------------------------------------------**

Included Tools for lose dat&#x61;**,** critical informationeither through accidental deletio&#x6E;**,** virus attack&#x73;**,**&#x63;orrupted data permanent removal of files

5&#x30;**.**&#x46;orensic Metapackage

**-----------------------------------------------------**

All here available tools are packaged by Debian Security Tools Team

Features 5&#x31;**-**&#x36;0

5&#x31;**.**&#x69;ncluded Sleuth Kit

**-----------------------------------------------------**

collection of command line tools to analyze disk images and recover files from them

5&#x32;**.**&#x45;xecShield Buffer Overflows

**-----------------------------------------------------** Protecting against buffer overflows

5&#x33;**.**&#x53;ecuring network access

**-----------------------------------------------------**

Protected against syn packet flooding and ARP attacks

5&#x34;**.**&#x44;isabled Aut&#x6F;**-**&#x6D;ounting

**-----------------------------------------------------**

Turn off removable drives Aut&#x6F;**-**&#x6D;ounting feature

5&#x35;**.**&#x44;isabled virtual machine shared folders

**-----------------------------------------------------**

Disabled Mounting virtual machine shared folders between host and guest

5&#x36;**.**&#x4E;ormal user as defualt

**-----------------------------------------------------**

Used normal user as defual&#x74;**,**&#x43;onsider disabling the root account permanently and run the command with sudo

5&#x37;**.**&#x56;olume or container encryption

**-----------------------------------------------------**

Included symmetric and asymmetric encryption tools for files and volumes

5&#x38;**.**&#x49;ncluded ASLR

**-----------------------------------------------------**

Address Space Layout Randomizatio&#x6E;**.**&#x75;ll randomization prevent the exploitation of memory corruption vulnerabilities

5&#x39;**.**&#x78;86 compatible and Virtual Machines

**-----------------------------------------------------**

Supported x86 compatible and Virtual Machines and virtualization

6&#x30;**.**&#x46;orensic Metapackage

**-----------------------------------------------------**

All here available tools are packaged by Debian Security Tools Team

**Features 61-70**

6&#x31;**.**&#x50;rotecting Network Traffic

**-----------------------------------------------------**

Included a collection of To&#x72;**,** torif&#x79;**,** and torsock&#x73;**,** ProxyChains to keeping OS anonymized

6&#x32;**.**&#x50;rotection against location discovery

**-----------------------------------------------------**

Protection against IP addres&#x73;**,**&#x6C;ocation discover&#x79;**,**&#x47;eolocatio&#x6E;**,** or location service&#x73;**,,**

6&#x33;**.**&#x4D;AC address Changer

**-----------------------------------------------------**

Protected against spoofing of the MAC addres&#x73;**,** generate a random value for each connection or manually by custome tool

6&#x34;**.**&#x43;old boot attack protection

**-----------------------------------------------------**

Prevents attacks by disabled hibernation and sleep mode&#x73;**,** wipe memor&#x79;**,**&#x66;ul&#x6C;**-**&#x64;isk encryption

6&#x35;**.**&#x50;revent NTP amplification attack

**-----------------------------------------------------**

Disabled Network time synchronization which synchronize system clock between devices to prevent NTP amplification attac&#x6B;**.**

6&#x36;**.**&#x55;pdated Microcode

**-----------------------------------------------------**

Applied CPU microcode updates

6&#x37;**.**&#x50;assword Manager Tools

**-----------------------------------------------------**

Included Trusted password manager&#x73;**,**&#x6D;anage your passwords in a secure way

6&#x38;**.**&#x44;isabled Microphones

**-----------------------------------------------------** Disabling Microphones by defualt

6&#x39;**.**&#x4D;etadata Cleaner

**-----------------------------------------------------**

Included Metadata Removal Tools

7&#x30;**.**&#x56;irtualBox Hardening

**-----------------------------------------------------**

VirtualBox Hardening

**Features 71-80**

7&#x31;**.**&#x44;isable ACPI

**-----------------------------------------------------**

Disable Advanced Configuration and Power Interface **(**&#x41;CP&#x49;**)**

7&#x32;**.**&#x52;estricting kernel modules

**-----------------------------------------------------**

Restricting module loading can protect the kerne&#x6C;**.**

7&#x33;**.**&#x44;isabled bug reporter

**-----------------------------------------------------** Disabled bug reporter software and services

7&#x34;**.**&#x70;reventing spoofing attacks

**-----------------------------------------------------** preventing spoofing attacks

7&#x35;**.**&#x45;nable TC&#x50;**/**&#x49;P SYN cookies

**-----------------------------------------------------**

Enable TCP SYN cookie protection to save domain from SYN Attack

7&#x36;**.**&#x50;acket forwarding for IPv&#x34;**/**&#x76;6

**-----------------------------------------------------**

Permits the kernel to forward packets from one network interface to another

7&#x37;**.**&#x50;revent MITM Attacks

**-----------------------------------------------------**

Do not accept ICMP redirects to prevent MITM attacks

7&#x38;**.**&#x41;ccept ICMP redirects

**-----------------------------------------------------**

Accept ICMP redirects only for gateways listed in our default

7&#x39;**.**&#x53;ize of inode cache

**----------------------------------------------------- Increase size of file handles and inode cache**

8&#x30;**.**&#x53;wapping and Caching

**-----------------------------------------------------** Increase size of swappiness and cache pressure Features 8&#x31;**-**&#x39;0

8&#x31;**.**&#x44;irty Rratio

**-----------------------------------------------------**

Better Linux Disk Caching **&** Performance

8&#x32;**.**&#x49;ncluded Network security option

**-----------------------------------------------------**

Increasing times SYNACKs for passive TCP connection

8&#x33;**.**&#x50;rotect Against TCP Tim&#x65;**-**&#x57;ait

**-----------------------------------------------------**

Protect Against TCP Tim&#x65;**-**&#x57;ait

8&#x34;**.**&#x43;ontrol Syncookies

**-----------------------------------------------------** Control Syncookies

8&#x35;**.**&#x53;ocket Sen&#x64;**/**&#x52;eceive Buffer

**-----------------------------------------------------** Increasing Socket Receive Buffer

8&#x36;**.**&#x49;ncrease memory buffers

**-----------------------------------------------------**

Increase the maximum rea&#x64;**/**&#x77;rite of option memory buffers space

8&#x37;**.**&#x50;revent DOS attacks

**-----------------------------------------------------**

Increase the tc&#x70;**-**&#x74;im&#x65;**-**&#x77;ait buckets pool size to prevent simple DOS attacks

8&#x38;**.**&#x49;ncreasing pid number

**-----------------------------------------------------** Increasing pid number

8&#x39;**.**&#x44;isabled IPv6

**-----------------------------------------------------** Disabled IPv6

9&#x30;**.**&#x45;nable IP spoofing protection

**----------------------------------------------------- Enable IP spoofing protection**

**Features 91-100**

9&#x31;**.**&#x6B;erne&#x6C;**.**&#x72;andomiz&#x65;**\_**&#x76;&#x61;**\_**&#x73;pace

**-----------------------------------------------------**

Random positions in a proces&#x73;**’**&#x73; address spac&#x65;**,** which makes it difficult for an attacking program to predict the memory address of the next instruction

9&#x32;**.** Tuning TCP buffer

**-----------------------------------------------------** Increase Linux auto tuning TCP buffer limits

9&#x33;**.**&#x50;revent Brute force attacks

**-----------------------------------------------------**

preventing brute force attack&#x73;**,** consider implementing the intrusion prevention software Fail2ban

9&#x34;**.**&#x45;nabled SELinux

**-----------------------------------------------------**

Enforcing mode is the default and enforcing the loaded security policy on the entire syste&#x6D;**.**

9&#x35;**.**&#x44;isable IP source routing

**-----------------------------------------------------**

Accept packets with the Strict Source Route **(**&#x53;S&#x52;**)** or Loose Source Routing **(**&#x4C;S&#x52;**)**

9&#x36;**.**&#x70;rotects against tim&#x65;**-**&#x77;ait assassination

**-----------------------------------------------------**

protects against tim&#x65;**-**&#x77;ait assassination by dropping RST packets for sockets in the tim&#x65;**-**&#x77;ait stat&#x65;**.**

9&#x37;**.**&#x70;revent ma&#x6E;**-**&#x69;&#x6E;**-**&#x74;h&#x65;**-**&#x6D;iddle attacks

**-----------------------------------------------------** disable ICMP redirect acceptance and sending to prevent ma&#x6E;**-**&#x69;&#x6E;**-**&#x74;h&#x65;**-**&#x6D;iddle attacks and minimise information disclosur&#x65;**.**

9&#x38;**.**&#x61;void Smurf attacks

**-----------------------------------------------------**

Ignore all ICMP requests to avoid Smurf attack&#x73;**,** make the device more difficult to enumerate on the network and prevent clock fingerprinting through ICMP timestamp&#x73;**.**

9&#x39;**.**&#x57;ireless devices blacklisted

**-----------------------------------------------------**

rfkill to reduce remote attack surface furthe&#x72;**.** To blacklist all wireless devices

10&#x30;**.**&#x47;rsecurity

**-----------------------------------------------------**

It will be add in next update

#### Social medias <a href="#toc171120229" id="toc171120229"></a>

[**http://t.me/UNIDENTIFIED\_TM** ](http://t.me/UNIDENTIFIED_TM)[**http://t.me/predator\_os**](http://t.me/predator_os)

[**https://www.linkedin.com/in/hossein-seilany-2931891b4** ](https://www.linkedin.com/in/hossein-seilany-2931891b4)[**https://github.com/hosseinseilani/**](https://github.com/hosseinseilani/)

© Copyright 2024 | hossein seilany

Telegram

***@seilany***

GitHub

***<https://github.com/hosseinseilani/>***

Youtube

***<https://www.youtube.com/@predator-os5453>***

Email

***<info.predator-os@gmail.com>***

Linkedin

***<https://www.linkedin.com/in/hossein-seilani>***

***pinterest***

***<https://www.pinterest.com/hosseinseilanii/>***

***All about me*****&#x20;<https://seilany.ir/>**

![](https://1209410422-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeghnpTQ7npkdA7nmIC2s%2Fuploads%2FwOt8K0tYf2NHbmGWpfQ5%2F1.png?alt=media)

**Founder**

**an**

**d**

**Develope**

**r**

**I am Hossein Seilani, M.S. in Computer Science, and the founder and**

**developer of Emperor**

**-**

**OS, Little**

**-**

**Psycho, and Predator**

**-**

**OS Linux. I have**

**certifications**

**in**

**various**

**domains,**

**including**

**experience**

**and**

**Linux/Windows Sysadmin, UX/UI, Front**

**-**

**End web design, SEO,**

**Graphic**

**Designer, Data Science, and machine learning.**

[**AL**](https://seilany.ir/)

[**L**](https://seilany.ir/)

[**ABOU**](https://seilany.ir/)

[**T**](https://seilany.ir/)

[**M**](https://seilany.ir/)

[**E**](https://seilany.ir/)

![](https://1209410422-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeghnpTQ7npkdA7nmIC2s%2Fuploads%2FvwMuDyzDQJ2TUvldtcHl%2F2.jpeg?alt=media)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://predator-os.gitbook.io/predator-os-beginner-guide-book/chapter-13.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
