mirror of
https://github.com/xn0px90/awesome-qubes-os.git
synced 2024-10-01 06:35:43 -04:00
fixed wireguard
This commit is contained in:
parent
a9bf358fea
commit
5bad38c1f9
17
README.md
17
README.md
@ -1,4 +1,3 @@
|
||||
|
||||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&G?~^^~?G&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#5!^::^^^^::^!YB@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#P7^:::^^^^^^^^^^:::^75#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||||
@ -30,7 +29,6 @@
|
||||
/_\__ __ _____ ___ ___ _ __ ___ / \ _ _| |__ ___ ___ / _ \/ __|
|
||||
/ _ \ V V / -_|_-</ _ \ ' \/ -_) | (_) | || | '_ \/ -_|_-< | (_) \__ \
|
||||
/_/ \_\_/\_/\___/__/\___/_|_|_\___| \__\_\\_,_|_.__/\___/__/ \___/|___/
|
||||
|
||||
# Awesome Qubes OS [![Track Awesome List](https://www.trackawesomelist.com/badge.svg)](https://www.trackawesomelist.com/xn0px90/Awesome-Qubes-OS/)[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
|
||||
|
||||
## A curated list of Awesome Qubes OS links
|
||||
@ -94,8 +92,7 @@ Contributions *very welcome* but first see [Contributing](#contributing).
|
||||
- [Certified Hardware](https://www.qubes-os.org/doc/certified-hardware/) - We aim for these vendors to be as diverse as possible in terms of geography, cost, and availability.
|
||||
- [Community-recommended hardware](https://www.qubes-os.org/doc/community-recommended-hardware/) - Community-recommended computers.
|
||||
- [Hardware compatibility list (HCL)](https://www.qubes-os.org/hcl/) - The HCL is a compilation of reports generated and submitted by users across various Qubes versions about their hardware’s compatibility with Qubes.
|
||||
- [System Requirements](https://www.qubes-os.org/doc/system-requirements/) - User documentation / Choosing your hardware.
|
||||
- [Security design goals](https://www.qubes-os.org/doc/security-design-goals/) - Qubes makes is that now the attacker doesn’t have access to all the software running in the other domains.
|
||||
- [System Requirements](https://www.qubes-os.org/doc/system-requirements/) - User documentation / Choyhe attacker doesn’t have access to all the software running in the other domains.
|
||||
- [Security-critical code](https://www.qubes-os.org/doc/security-critical-code/) - A list of security-critical (i.e., trusted) code components in Qubes OS.
|
||||
- [Storage pools](https://www.qubes-os.org/doc/storage-pools/) - Qubes OS implements a security-by-isolation (or security-by-compartmentalization) approach by providing the ability to easily create many security domains.
|
||||
- [Secondary storage](https://www.qubes-os.org/doc/secondary-storage/) - hese steps assume you have already created a separate volume group and thin pool (not thin volume) for your HDD.
|
||||
@ -145,7 +142,6 @@ Contributions *very welcome* but first see [Contributing](#contributing).
|
||||
- [How to Implement TPM Boot Verification](https://github.com/kennethrrosen/qubes-boot-verification) - Verify and validate boot process using PCR without Heads or AEM on systems using TPM 2.0
|
||||
- [How to open Urls in other qube](https://forum.qubes-os.org/t/opening-urls-files-in-other-qubes/19026) - This page is about opening URLs and files from one qube in a different qube.
|
||||
|
||||
|
||||
## Templates
|
||||
|
||||
- [Building a TemplateVM for a new OS](https://forum.qubes-os.org/docs?topic=18972) - If you don’t like using one of the existing templates because of specific administration, package management or other building needs, you can build a TemplateVM for your distribution of choice.
|
||||
@ -167,8 +163,6 @@ Contributions *very welcome* but first see [Contributing](#contributing).
|
||||
- [USB Qubes](https://www.qubes-os.org/doc/usb-qubes/) - A USB qube acts as a secure handler for potentially malicious USB devices, preventing them from coming into contact with dom0 (which could otherwise be fatal to the security of the whole system). I
|
||||
- [Xfce templates](https://www.qubes-os.org/doc/templates/xfce/) - If you would like to use Xfce (more lightweight compared to GNOME desktop environment) Linux distribution in your Qubes, you can install one of the available Xfce templates for Fedora, CentOS or Gentoo.
|
||||
|
||||
|
||||
|
||||
## VM-Hardening
|
||||
|
||||
- [Kicksecure](https://www.kicksecure.com/wiki/Kicksecure-Qubes_Security) - The following list of actionable items can help to improve security on the Qubes platform, and by extension Kicksecure ™ for Qubes users.
|
||||
@ -227,11 +221,12 @@ Contributions *very welcome* but first see [Contributing](#contributing).
|
||||
## Clearnet & Anonymous Networking
|
||||
|
||||
### DNS
|
||||
|
||||
- [dnscrypt-proxy](https://forum.qubes-os.org/t/guide-how-to-setup-a-sys-dns-qube/13749) - Run dnscrypt-proxy inside of sys-net to encrypt and secure dns-requests.
|
||||
|
||||
### Wireguard
|
||||
|
||||
- [Mullvad VPN (FE38 + WG)](https://mullvad.net/en/help/wireguard-on-qubes-os/) - Privacy-first VPN provider's guide for Qubes OS. This guide bears an optimal method for setting up a WG ProxyVM (i.e `sys-vpn`); you may substitute out Mullvad's WG configuration files in place of your own.
|
||||
- [Mullvad VPN (Fedora-38 + WG)](https://mullvad.net/en/help/wireguard-on-qubes-os/) - Privacy-first VPN provider's guide for Qubes OS. This guide bears an optimal method for setting up a WG ProxyVM (i.e `sys-vpn`); you may substitute out Mullvad's WG configuration files in place of your own.
|
||||
|
||||
### OpenVPN
|
||||
|
||||
@ -301,8 +296,6 @@ Contributions *very welcome* but first see [Contributing](#contributing).
|
||||
- [Radare2](https://github.com/radareorg/radare2) - Libre Reversing Framework for Unix Geeks.
|
||||
- [Volatility3](https://github.com/volatilityfoundation/volatility3) - Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples.
|
||||
|
||||
|
||||
|
||||
## Optics and Extra Info
|
||||
|
||||
- [3mdeb](https://3mdeb.com/) - We’re hands-on firmware experts with years of experience writing elegant, scalable and custom code for clients.
|
||||
@ -323,7 +316,6 @@ Contributions *very welcome* but first see [Contributing](#contributing).
|
||||
### Xen Exploitation
|
||||
|
||||
- [Advanced Exploitation](https://www.youtube.com/watch?v=6Ld5CiInrcI) - Xen Hypervisor VM Escape
|
||||
|
||||
- [Blackhat 2010 ](https://www.youtube.com/watch?v=sTC9x5hYYFo) - Hacking the Hypervisor
|
||||
- [Blackhat 2014](https://www.youtube.com/watch?v=PJWJjb0uxXE) - [[Website Slides]](https://www.blackhat.com/docs/eu-14/materials/eu-14-Wojtczuk-Lessons-Learned-From-Eight-Years-Of-Breaking-Hypervisors.pdf) - Lessons Learned from Eight Years of Breaking Hypervisors
|
||||
- [Blackhat 2015](https://www.youtube.com/watch?v=nyW3eTobXAI) - [[PDF Slides]](http://c7zero.info/stuff/AttackingHypervisorsViaFirmware_bhusa15_dc23.pdf) - Attacking Hypervisors Using Firmware And Hardware
|
||||
@ -339,8 +331,6 @@ Contributions *very welcome* but first see [Contributing](#contributing).
|
||||
- [Xen exploitation part 1: XSA-105](https://blog.quarkslab.com/xen-exploitation-part-1-xsa-105-from-nobody-to-root.html) - From nobody to root
|
||||
- [Xen exploitation part 2: XSA-148](https://blog.quarkslab.com/xen-exploitation-part-2-xsa-148-from-guest-to-host.html) - From guest to host
|
||||
|
||||
|
||||
|
||||
## Qubes OS Server
|
||||
|
||||
- [Ansible](https://qubes-ansible.readthedocs.io/en/latest/) - Automation with Ansible.
|
||||
@ -351,7 +341,6 @@ Contributions *very welcome* but first see [Contributing](#contributing).
|
||||
- [Qubes core admin](https://www.qubes-os.org/doc/qubes-core-admin/) - Qubes core-admin’s documentation!
|
||||
- [Qubes core stack](https://www.qubes-os.org/doc/qubes-core-stack/) - Introducing the Next Generation Qubes Core Stack.
|
||||
|
||||
|
||||
## Qubes OS Legends
|
||||
|
||||
- [Joanna Rutkowska](https://en.wikipedia.org/wiki/Joanna_Rutkowska) - Founder of Qubes OS.
|
||||
|
Loading…
Reference in New Issue
Block a user