Update README.md

This commit is contained in:
xn0px90 2023-01-06 12:31:45 -07:00 committed by GitHub
parent e00a5faf0a
commit 792d039ec8
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -1,3 +1,11 @@
# Avesome Qubes OS [![Track Awesome List](https://www.trackawesomelist.com/badge.svg)](https://www.trackawesomelist.com/xn0px90/Awesome-Qubes-OS/)[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&G?~^^~?G&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&G?~^^~?G&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ -32,37 +40,43 @@
/ _ \ V V / -_|_-</ _ \ ' \/ -_) | (_) | || | '_ \/ -_|_-< | (_) \__ \ / _ \ V V / -_|_-</ _ \ ' \/ -_) | (_) | || | '_ \/ -_|_-< | (_) \__ \
/_/ \_\_/\_/\___/__/\___/_|_|_\___| \__\_\\_,_|_.__/\___/__/ \___/|___/ /_/ \_\_/\_/\___/__/\___/_|_|_\___| \__\_\\_,_|_.__/\___/__/ \___/|___/
[![Build Status](https://app.travis-ci.com/xn0px90/Awesome-Qubes-OS.svg?branch=main)](https://app.travis-ci.com/xn0px90/Awesome-Qubes-OS)
[![Track Awesome List](https://www.trackawesomelist.com/badge.svg)](https://www.trackawesomelist.com/xn0px90/Awesome-Qubes-OS/)
[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/xn0px90/Awesome-Qubes-OS)
# A collection of awesome Qubes OS links
<details open="open"> # A curated list of awesome Qubes OS links
<summary>Contents</summary>
<ol> ## Table of Contents
<ul>
<li><a href="#system-requirements">System Requirements</a></li> - [QuibesOS Websites](#QubesOS-Website)
<li><a href="#downloading-installing-and-upgrading">Downloading, installing, and upgrading</a></li> - [System Requirements](#System-Requirements)
</ul> - [Downloading, Installing, Upgrading and Building](#Downloading,-Installing,-Upgrading-and-Building)
</li> - [How-to guides](How-to-guides)
<li> - [Templates](#Templates)
<a href="#how-to-guides">How-to Guides</a> - [Networking Server](Networking-Server)
</li> - [Automation](#Automation)
<li><a href="#templates">Templates</a></li> - [Video & Screen Sharing](#Video-&-Screen-Sharing)
<li><a href="#conferences-and-events">Conferences and Events</a></li> - [Remote-Desktop](#Remote-Desktop)
<li><a href="#advanced-topics">Advanced Topics</a></li> - [VPN](#VPN)
<ul> - [TOR](#TOR)
<li><a href="#security">Security</a></li> - [Videos](#Videos)
<li><a href="#system">System</a></li> - [Security](#Security)
<ul> - [Xen](#Xen)
<li><a href="#services">Services</a></li> - [Kernels](#Kernels)
</ul> - [Unikernels](#Unikernels)
</ul> - [Unikernel-like](#Unikernel-like)
<li><a href="#online-communities">Online Communities</a></li> - [Exploitation](#Exploitation)
<li><a href="#releases">Releases</a></li> - [Attacking Hypervisors](#Attacking-Hypervisors)
</ol> - [VM-Hardening](#VM-Hardening)
</details> - [System](#System)
- [Services](#Services)
- [Advanced Topics](#Advanced-Topics)
- [Qubes OS Legends](#Qubes-OS-Legends)
- [Training](#Training)
- [Companies using Qubes OS](#Companies-using-Qubes-OS)
- [Social media](#Social-media)
- [Contributing](#Contributing)
- [Releases](#Releases)
- [License](#License)
## QubesOS Websites ## QubesOS Websites
- [Qubes OS](https://www.qubes-os.org) - Qubes OS is an operating system built out of securely-isolated compartments called qubes. - [Qubes OS](https://www.qubes-os.org) - Qubes OS is an operating system built out of securely-isolated compartments called qubes.
@ -186,6 +200,17 @@
## Vitualization ## Vitualization
- [awesome-virtualization](https://github.com/Wenzel/awesome-virtualization) - A curated list of awesome resources about virtualization. - [awesome-virtualization](https://github.com/Wenzel/awesome-virtualization) - A curated list of awesome resources about virtualization.
### Xen
- [Ouroboros: Tearing Xen Hypervisor With the Snake](https://www.youtube.com/watch?v=kt3kX94kWcM)
- [Subverting the Xen hypervisor](https://invisiblethingslab.com/resources/bh08/part1.pdf)
- [Preventing and Detecting Xen Hypervisor Subversions](https://invisiblethingslab.com/resources/bh08/part2.pdf)
- [Bluepilling the Xen Hypervisor](https://invisiblethingslab.com/resources/bh08/part3.pdf)
- [XenPwn: Breaking paravirtualized devices](https://www.youtube.com/watch?v=qxz8MzE3QME) - [[Slide]](https://www.blackhat.com/docs/us-16/materials/us-16-Wilhelm-Xenpwn-Breaking-Paravirtualized-Devices-wp.pdf)
- [Advanced Exploitation: Xen Hypervisor VM Escape ](https://www.youtube.com/watch?v=6Ld5CiInrcI)
- [Xen exploitation part 1: XSA-105, from nobody to root](https://blog.quarkslab.com/xen-exploitation-part-1-xsa-105-from-nobody-to-root.html)
- [Xen exploitation part 2: XSA-148, from guest to host](https://blog.quarkslab.com/xen-exploitation-part-2-xsa-148-from-guest-to-host.html)
## Kernels ## Kernels
- [eBPF](https://ebpf.io) - eBPF is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in an operating system kernel. - [eBPF](https://ebpf.io) - eBPF is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in an operating system kernel.
- [sel4](https://sel4.systems/) - seL4 is a high-assurance, high-performance operating system microkernel. - [sel4](https://sel4.systems/) - seL4 is a high-assurance, high-performance operating system microkernel.
@ -202,7 +227,7 @@
- [Drawbridge](https://www.microsoft.com/en-us/research/project/drawbridge) - Research prototype platform from Microsoft. - [Drawbridge](https://www.microsoft.com/en-us/research/project/drawbridge) - Research prototype platform from Microsoft.
- [Graphene](https://github.com/oscarlab/graphene) - Library OS optimized for Intel SGX. - [Graphene](https://github.com/oscarlab/graphene) - Library OS optimized for Intel SGX.
## Exploit Developent ## Exploitation
- [libvmi](https://libvmi.com/) - LibVMI is a C library with Python bindings that makes it easy to monitor the low-level details of a running virtual machine - [libvmi](https://libvmi.com/) - LibVMI is a C library with Python bindings that makes it easy to monitor the low-level details of a running virtual machine
- [microlibvmi](https://github.com/Wenzel/libmicrovmi) - A cross-platform unified Virtual Machine Introspection API library - [microlibvmi](https://github.com/Wenzel/libmicrovmi) - A cross-platform unified Virtual Machine Introspection API library
- [awesome-virtualization](https://github.com/Wenzel/awesome-virtualization) - A curated list of awesome resources about virtualization. - [awesome-virtualization](https://github.com/Wenzel/awesome-virtualization) - A curated list of awesome resources about virtualization.
@ -224,6 +249,16 @@
- [pcileech](https://github.com/memflow/memflow-pcileech) - access pcileech interface - [pcileech](https://github.com/memflow/memflow-pcileech) - access pcileech interface
- [coredump](https://github.com/memflow/memflow-coredump) - access Microsoft Windows Coredump files - [coredump](https://github.com/memflow/memflow-coredump) - access Microsoft Windows Coredump files
## Attacking Hypervisors
- [Blackhat 2010 - Hacking the Hypervisor](https://www.youtube.com/watch?v=sTC9x5hYYFo&t=3s)
- [Software Attacks on Hypervisor Emulation of Hardware](https://www.youtube.com/watch?v=c4DnlP88D2Y) - [[Slides]](https://www.troopers.de/downloads/troopers17/TR17_Attacking_hypervisor_through_hardwear_emulation.pdf)
- [Lessons Learned from Eight Years of Breaking Hypervisors](https://www.youtube.com/watch?v=PJWJjb0uxXE) - [[Slides]](https://www.blackhat.com/docs/eu-14/materials/eu-14-Wojtczuk-Lessons-Learned-From-Eight-Years-Of-Breaking-Hypervisors.pdf)
- [Attacking Hypervisors Using Firmware And Hardware](https://www.youtube.com/watch?v=nyW3eTobXAI) - [[Slides]](http://c7zero.info/stuff/AttackingHypervisorsViaFirmware_bhusa15_dc23.pdf)
- [The Arms Race Over Virtualization](https://www.youtube.com/watch?v=nWvg7NKwOjg) - [[Slides]](https://www.blackhat.com/docs/us-16/materials/us-16-Luan-Ouroboros-Tearing-Xen-Hypervisor-With-The-Snake.pdf)
- [Glitches in the Matrix Escape via NMI](https://www.cpl0.com/blog/?p=46)
- [Hypervisor Vulnerability Research - State of the Art](https://alisa.sh/slides/HypervisorVulnerabilityResearch2020.pdf)
## VM-Hardening ## VM-Hardening
- [Qubes-VM-hardening](https://github.com/tasket/Qubes-VM-hardening) - [Qubes-VM-hardening](https://github.com/tasket/Qubes-VM-hardening)