Update README.md

This commit is contained in:
xn0px90 2023-01-08 20:16:45 -07:00 committed by GitHub
parent 418cdda8c4
commit 5a83eb3d9c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -135,13 +135,14 @@
## Automation ## Automation
- [Ansible](https://qubes-ansible.readthedocs.io/en/latest/) - Automation with Ansible - [Ansible](https://qubes-ansible.readthedocs.io/en/latest/) - Automation with Ansible
## GPU ## GPU
- [gui-domain](https://www.qubes-os.org/doc/gui-domain/) - [GUI-domain](https://www.qubes-os.org/doc/gui-domain/)
- [gui-configuration](https://www.qubes-os.org/doc/gui-configuration/) - [GUI-configuration](https://www.qubes-os.org/doc/gui-configuration/)
- [gui-troubleshooting](https://www.qubes-os.org/doc/gui-troubleshooting/) - [GUI-troubleshooting](https://www.qubes-os.org/doc/gui-troubleshooting/)
- [how-to-use-pci-devices](https://www.qubes-os.org/doc/how-to-use-pci-devices/) - [GUI virtualization](https://www.qubes-os.org/doc/gui/)
- [nvidia-troubleshooting](https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/nvidia-troubleshooting.md) - [How-to-use-pci-devices](https://www.qubes-os.org/doc/how-to-use-pci-devices/)
- [install-nvidia-driver](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/install-nvidia-driver.md) - [Nvidia-troubleshooting](https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/nvidia-troubleshooting.md)
- [windows-gaming-hvm](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/windows-gaming-hvm.md) - [Install-nvidia-driver](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/install-nvidia-driver.md)
- [Windows-gaming-hvm](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/windows-gaming-hvm.md)
## Video & Screen Sharing ## Video & Screen Sharing
- [qubes-video-companion](https://github.com/elliotkillick/qubes-video-companion) - Qubes Video Companion is a tool for securely streaming webcams and sharing screens across virtual machines. - [qubes-video-companion](https://github.com/elliotkillick/qubes-video-companion) - Qubes Video Companion is a tool for securely streaming webcams and sharing screens across virtual machines.
@ -150,9 +151,9 @@
- [KDE (desktop environment)](https://www.qubes-os.org/doc/kde/) - [KDE (desktop environment)](https://www.qubes-os.org/doc/kde/)
- [i3 (window manager)](https://www.qubes-os.org/doc/i3/) - [i3 (window manager)](https://www.qubes-os.org/doc/i3/)
- [AwesomeWM (window manager)](https://www.qubes-os.org/doc/awesomewm/)) - [AwesomeWM (window manager)](https://www.qubes-os.org/doc/awesomewm/))
- [brightness-ajustment](https://forum.qubes-os.org/t/easy-brightness-adjustment/15902/2) - [Brightness-ajustment](https://forum.qubes-os.org/t/easy-brightness-adjustment/15902/2)
- [custom icons](https://forum.qubes-os.org/t/where-is-the-most-optimal-place-to-put-custom-folder-icons/15740/3) - [Custom icons](https://forum.qubes-os.org/t/where-is-the-most-optimal-place-to-put-custom-folder-icons/15740/3)
- [suckless dwm](https://github.com/3o14r473/GUIDE_how-to-install-dwm-in-qubesos) - How to install dwm in qubesos - [Suckless dwm](https://github.com/3o14r473/GUIDE_how-to-install-dwm-in-qubesos) - How to install dwm in qubesos
## Remote-Desktop ## Remote-Desktop
- [qubes-remote-desktop](https://github.com/QubesOS-contrib/qubes-remote-desktop) - SystemD services for creating VNC server session in dom0 or any qube. - [qubes-remote-desktop](https://github.com/QubesOS-contrib/qubes-remote-desktop) - SystemD services for creating VNC server session in dom0 or any qube.
@ -212,7 +213,7 @@
## Kernels ## Kernels
- [eBPF](https://ebpf.io) - eBPF is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in an operating system kernel. - [eBPF](https://ebpf.io) - eBPF is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in an operating system kernel.
- [sel4](https://sel4.systems/) - seL4 is a high-assurance, high-performance operating system microkernel. - [Sel4](https://sel4.systems/) - seL4 is a high-assurance, high-performance operating system microkernel.
- [OpenXT](https://openxt.org/) - OpenXT is an open-source development toolkit for hardware-assisted security research and appliance integration - [OpenXT](https://openxt.org/) - OpenXT is an open-source development toolkit for hardware-assisted security research and appliance integration
## Unikernels ## Unikernels
@ -234,7 +235,7 @@
- [radare2](https://github.com/radareorg/radare2) - Libre Reversing Framework for Unix Geeks - [radare2](https://github.com/radareorg/radare2) - Libre Reversing Framework for Unix Geeks
- [American Fuzzy Lop](https://github.com/google/AFL) - Fuzzing is one of the most powerful and proven strategies for identifying security issues in real-world software - [American Fuzzy Lop](https://github.com/google/AFL) - Fuzzing is one of the most powerful and proven strategies for identifying security issues in real-world software
- [Bonzai](https://github.com/rwxrob/bonzai) - It's like a modular, multicall BusyBox builder for Go with built in completion and embedded documentation support. - [Bonzai](https://github.com/rwxrob/bonzai) - It's like a modular, multicall BusyBox builder for Go with built in completion and embedded documentation support.
- [codeQL](https://codeql.github.com/) - Discover vulnerabilities across a codebase with CodeQL - [CodeQL](https://codeql.github.com/) - Discover vulnerabilities across a codebase with CodeQL
- [joern](https://github.com/joernio/joern) - Joern is a platform for analyzing source code, bytecode, and binary executables. It generates code property graphs (CPGs), a graph representation of code for cross-language code analysis - [joern](https://github.com/joernio/joern) - Joern is a platform for analyzing source code, bytecode, and binary executables. It generates code property graphs (CPGs), a graph representation of code for cross-language code analysis
- [awesome-fuzzing](https://github.com/cpuu/awesome-fuzzing) - A curated list of references to awesome Fuzzing for security testing. Additionally there is a collection of freely available academic papers, tools and so on. - [awesome-fuzzing](https://github.com/cpuu/awesome-fuzzing) - A curated list of references to awesome Fuzzing for security testing. Additionally there is a collection of freely available academic papers, tools and so on.
- [Volatility3](https://github.com/volatilityfoundation/volatility3) - Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples. - [Volatility3](https://github.com/volatilityfoundation/volatility3) - Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples.
@ -283,7 +284,6 @@
- [Qubes core admin](https://www.qubes-os.org/doc/qubes-core-admin/) - [Qubes core admin](https://www.qubes-os.org/doc/qubes-core-admin/)
- [Qubes core admin client](https://www.qubes-os.org/doc/qubes-core-admin-client/) - [Qubes core admin client](https://www.qubes-os.org/doc/qubes-core-admin-client/)
- [Qubes core stack](https://www.qubes-os.org/doc/qubes-core-stack/) - [Qubes core stack](https://www.qubes-os.org/doc/qubes-core-stack/)
- [GUI virtualization](https://www.qubes-os.org/doc/gui/)
- [Networking](https://www.qubes-os.org/doc/networking/) - [Networking](https://www.qubes-os.org/doc/networking/)
- [Template implementation](https://www.qubes-os.org/doc/template-implementation/) - [Template implementation](https://www.qubes-os.org/doc/template-implementation/)
- [Storage pools](https://www.qubes-os.org/doc/storage-pools/) - [Storage pools](https://www.qubes-os.org/doc/storage-pools/)