Predator-OS has Secure and Hardened Tools, Firewalls, Antivirus, Rootkit, Malware Analysis

The OS that naturally preys on others


Hardening Linux systems can be a time-consuming task, especially if you don't know what to look at. The Predator-OS help you as a Linux hardened distro. The Predator-OS is an open-source security-oriented operating system for single-user desktop computing, and using the following features of hardened and secured:

several Proxy tools
pre-customized and secure xfce4 a lightweight desktop.
Clears cache and deletes temporary files very effectively.
This frees up disk space, improves performance, but most importantly helps to protect privacy.
Web browser Legitimate
Up-to-date Browser
Check for HTTPS everywhere
Manage Cookies
Block Third-Party Cookies
Block advertising
Avoid G Translate for Webpage
Disable Automatic Downloads
Disallow Access to Sensors
Disallow Location
Disable Browser Password Saves
Deactivate ActiveX
Deactivate Flash
Use The Tor Browser
Fully End-to-End Encrypted Messengers
Protect against DNS leaks
secure VPN Protocol
MAC Addresses changer
hostname changer
Reduced Background Activity and services
up-to-date System
Standby, hibernate, sleep in power option is disabled.
disabled Root Account for Non-Admin Tasks
Rootkit detection tools
you can Scan for rootkits, backdoors, and possible local exploits.
Disk encryption software
Packet filtering tools
Wireless network detector, sniffer, and intrusion detection system
Network intrusion prevention and detection
security audit of UNIX system tools
Lightweight and easy-to-use password manager
detecting viruses and trojans among other security and privacy threats.
detecting local rootkits
check for Rootkits tools
Disabled Undesired Features
Secure SSH Access
Provides cryptographic privacy and authentication,Forces sites to load in HTTPS
Exif/ Metadata is "data about data", this additional information removed all metadata files
IDS / IPS / Host IDS / Host IPS tools
network intrusion prevention system (NIPS) and network intrusion detection system (NIDS)
Honey Pot / Honey Net
USB guard tools
System update notify
Enable SELinux on enforcing
Shutdown unnecessary services
Disable unused filesystems
Disable Automounting
package manager repositories are configured
Filesystem Integrity Checked
AIDE tool is installed
core dumps are restricted
address space layout randomization (ASLR) is enabled
All AppArmor Profiles are configured.
the message of the day is configured properly.
permissions on /etc/motd are configured.
permissions on /etc/issue are configured
permissions on /etc/ are configured
Time synchronization is in use.
NTP is configured
rsyslog Service is enabled
logging is configured
rsyslog default file permissions configured.
Syslog-ng service is enabled
syslog-ng default file permissions configured
logrotate is configured
/etc/crontab are configured
permissions on /etc/passwd are configured
permissions on /etc/group are configured
permissions on /etc/gshadow are configured
permissions on /etc/passwd- are configured
permissions on /etc/shadow- are configured
Ensure permissions on /etc/group- are configured
Ensure permissions on /etc/gshadow- are configured
No world-writable files exist.
the extra firewall protects tools added.