diff --git a/README.md b/README.md index 162001b..7fd8424 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,7 @@ -# Avesome Qubes OS [![Track Awesome List](https://www.trackawesomelist.com/badge.svg)](https://www.trackawesomelist.com/xn0px90/Awesome-Qubes-OS/)[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) +# Awesome Qubes OS + +[![Track Awesome List](https://www.trackawesomelist.com/badge.svg)](https://www.trackawesomelist.com/xn0px90/Awesome-Qubes-OS/)[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) + @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&G?~^^~?G&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#5!^::^^^^::^!YB@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#P7^:::^^^^^^^^^^:::^75#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@ -31,338 +34,359 @@ / _ \ V V / -_|_-A security-focused desktop operating system that aims to provide security through isolation.

+This list is a collection of tools, projects, images, and resources conforming to the [Awesome Manifesto](https://github.com/sindresorhus/awesome/blob/master/awesome.md). -This list is a collection of tools, projects, images and resources conforming to the [Awesome Manifesto](https://github.com/sindresorhus/awesome/blob/master/awesome.md) - -Contributions *very welcome* but first see [Contributing](#contributing) +Contributions *very welcome* but first see [Contributing](#contributing). ## Table of Contents -- [Qubes OS Websites](#Qubes-OS-Websites) -- [System Requirements](#System-Requirements) -- [Downloading, Installing, Upgrading and Building](#Downloading,-Installing,-Upgrading-and-Building) -- [How-to guides](How-to-guides) -- [Templates](#Templates) -- [Qubes OS Server](#Qubes-OS-Server) -- [GPU](#GPU) -- [Desktop Customization](#Desktop-Customization) -- [VPN](#VPN) -- [Darknet](#Darknet) -- [Crypto](#Crypto) -- [Videos](#Videos) -- [Security](#Security) -- [Kernels](#Kernels) -- [Unikernels](#Unikernels) -- [Unikernel-like](#Unikernel-like) -- [Exploitation Tools](#Exploitation-Tools) -- [Xen Exploitation](#Xen-Exploitation) -- [VM-Hardening](#VM-Hardening) -- [System](#System) -- [Services](#Services) -- [Advanced Topics](#Advanced-Topics) -- [Qubes OS Legends](#Qubes-OS-Legends) -- [Training](#Training) -- [Companies using Qubes OS](#Companies-using-Qubes-OS) -- [Social media](#Social-media) -- [Contributing](#Contributing) -- [Releases](#Releases) -- [Adventure Further](#Adventure-Further) -- [License](#License) +- [Qubes OS Websites](#qubes-os-websites) +- [System Requirements](#system-requirements) +- [Downloading, Installing, Upgrading, and Building](#downloading-installing-upgrading-and-building) +- [How-to guides](#how-to-guides) +- [Templates](#templates) +- [Qubes OS Server](#qubes-os-server) +- [GPU](#gpu) +- [Desktop Customization](#desktop-customization) +- [VPN](#vpn) +- [Darknet](#darknet) +- [Crypto](#crypto) +- [Videos](#videos) +- [Security](#security) +- [Kernels](#kernels) +- [Unikernels](#unikernels) +- [Unikernel-like](#unikernel-like) +- [Exploitation Tools](#exploitation-tools) +- [Xen Exploitation](#xen-exploitation) +- [VM-Hardening](#vm-hardening) +- [System](#system) +- [Services](#services) +- [Advanced Topics](#advanced-topics) +- [Qubes OS Legends](#qubes-os-legends) +- [Training](#training) +- [Companies using Qubes OS](#companies-using-qubes-os) +- [Social media](#social-media) +- [Contributing](#contributing) +- [Releases](#releases) +- [Adventure Further](#adventure-further) +- [License](#license) ## Qubes OS Websites - - [Qubes OS](https://www.qubes-os.org) - Qubes OS is an operating system built out of securely-isolated compartments called qubes. - - [Qubes OS.onion](www.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion) - Qubes OS onion address. - - [Qubes OS Documentation](https://www.qubes-os.org/doc/) - Qubes OS main documentation. - - [Qubes OS Github Documentation](https://github.com/QubesOS/qubes-doc) - Qubes OS github latest documentation. - - [Qubes OS Development Documentation](https://dev.qubes-os.org/en/latest/) - Qubes OS development documentation. - - [Qubes OS News](https://www.qubes-os.org/news/) - Latest Qubes OS News. - -## System Requirements - - [System Requirements](https://www.qubes-os.org/doc/system-requirements/) - - [Certified Hardware](https://www.qubes-os.org/doc/certified-hardware/) - - [Community-recommended hardware](https://www.qubes-os.org/doc/community-recommended-hardware/) - - [Hardware compatibility list (HCL)](https://www.qubes-os.org/hcl/) -## Downloading, Installing, Upgrading and Building - - [Qubes OS 4.1.1](https://www.qubes-os.org/downloads/) - Qubes OS 4.1.1 Download - - [Qubes OS 4.1.2 Weekly Builds](https://qubes.notset.fr/iso/) - Qubes OS 4.1.2 Weekly Build Download - - [Installing](https://www.qubes-os.org/doc/installation-guide/) - Qubes OS installation guide! - - [Upgrading](https://www.qubes-os.org/doc/upgrade/) - These guides are for upgrading from one version of Qubes to another. - - [Building](https://github.com/QubesOS/qubes-builderv2) - This is the second generation of the Qubes OS builder +- [Qubes OS](https://www.qubes-os.org) - Qubes OS is an operating system built out of securely-isolated compartments called qubes. +- [Qubes OS Development Documentation](https://dev.qubes-os.org/en/latest/) - Qubes OS development documentation. +- [Qubes OS Documentation](https://www.qubes-os.org/doc/) - Qubes OS main documentation. +- [Qubes OS Github Documentation](https://github.com/QubesOS/qubes-doc) - Qubes OS github latest documentation. +- [Qubes OS News](https://www.qubes-os.org/news/) - Latest Qubes OS News. +- [Qubes OS Onion](www.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion) - Qubes OS onion address on the Tor network. + +## System Requirements + +- [Certified Hardware](https://www.qubes-os.org/doc/certified-hardware/) +- [Community-recommended hardware](https://www.qubes-os.org/doc/community-recommended-hardware/) +- [Hardware compatibility list (HCL)](https://www.qubes-os.org/hcl/) +- [System Requirements](https://www.qubes-os.org/doc/system-requirements/) + +## Downloading, Installing, Upgrading, and Building + +- [Building](https://github.com/QubesOS/qubes-builderv2) - This is the second generation of the Qubes OS builder. +- [Installing](https://www.qubes-os.org/doc/installation-guide/) - Qubes OS installation guide! +- [Qubes OS 4.1.1](https://www.qubes-os.org/downloads/) - Qubes OS 4.1.1 download. +- [Qubes OS 4.1.2 Weekly Builds](https://qubes.notset.fr/iso/) - Qubes OS 4.1.2 Weekly Build download. +- [Upgrading](https://www.qubes-os.org/doc/upgrade/) - These guides are for upgrading from one version of Qubes to another. ## How-to guides - - [How to update](https://www.qubes-os.org/doc/how-to-update/) - - [How to back up, restore, and migrate](https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/) - - [How to copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) - - [How to copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) - - [How to copy from dom0](https://www.qubes-os.org/doc/how-to-copy-from-dom0/) - - [How to install software](https://www.qubes-os.org/doc/how-to-install-software/) - - [How to use disposables](https://www.qubes-os.org/doc/how-to-use-disposables/) - - [How to enter fullscreen mode](https://www.qubes-os.org/doc/how-to-enter-fullscreen-mode/) - - [How to use devices](https://www.qubes-os.org/doc/how-to-use-devices/) - - [How to use block storage devices](https://www.qubes-os.org/doc/how-to-use-block-storage-devices/) - - [How to use USB devices](https://www.qubes-os.org/doc/how-to-use-usb-devices/) - - [How to use PCI devices](https://www.qubes-os.org/doc/how-to-use-pci-devices/) - - [How to use optical discs](https://www.qubes-os.org/doc/how-to-use-optical-discs/) + +- [How to back up, restore, and migrate](https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/) +- [How to copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) +- [How to copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) +- [How to copy from dom0](https://www.qubes-os.org/doc/how-to-copy-from-dom0/) +- [How to enter fullscreen mode](https://www.qubes-os.org/doc/how-to-enter-fullscreen-mode/) +- [How to install software](https://www.qubes-os.org/doc/how-to-install-software/) +- [How to update](https://www.qubes-os.org/doc/how-to-update/) +- [How to use PCI devices](https://www.qubes-os.org/doc/how-to-use-pci-devices/) +- [How to use USB devices](https://www.qubes-os.org/doc/how-to-use-usb-devices/) +- [How to use block storage devices](https://www.qubes-os.org/doc/how-to-use-block-storage-devices/) +- [How to use devices](https://www.qubes-os.org/doc/how-to-use-devices/) +- [How to use disposables](https://www.qubes-os.org/doc/how-to-use-disposables/) +- [How to use optical discs](https://www.qubes-os.org/doc/how-to-use-optical-discs/) ## Templates - - [Templates](https://www.qubes-os.org/doc/templates/) - - [Template: Ubuntu](https://github.com/Qubes-Community/Contents/blob/master/docs/os/ubuntu.md) - - [Template: Windows](https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows-vm.md) - - [Customizing Windows 7 templates](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/windows-template-customization.md) - - [Template: Whonix](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/whonix.md) - - [Template: CentOS](https://github.com/Qubes-Community/Contents/blob/master/docs/os/centos.md) - - [Template: Gentoo](https://github.com/Qubes-Community/Contents/blob/master/docs/os/gentoo.md) - - [Pentesting: BlackArch](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/blackarch.md) - - [Pentesting: Kali](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/kali.md) - - [Pentesting: Parrot](https://www.parrotsec.org/docs/parrot-on-qubesos.html) - - [Pentesting: PTF](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/ptf.md) - - [Fedora templates](https://www.qubes-os.org/doc/templates/fedora/) - - [Debian templates](https://www.qubes-os.org/doc/templates/debian/) - - [Minimal templates](https://www.qubes-os.org/doc/templates/minimal/) - - [Customizing Fedora minimal templates](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/fedora-minimal-template-customization.md) - - [Xfce templates](https://www.qubes-os.org/doc/templates/xfce/) - - [Tips for Using Linux in an HVM](https://github.com/Qubes-Community/Contents/blob/master/docs/os/linux-hvm-tips.md) - - [Creating a NetBSD VM](https://github.com/Qubes-Community/Contents/blob/master/docs/os/netbsd.md) +- [Creating a NetBSD VM](https://github.com/Qubes-Community/Contents/blob/master/docs/os/netbsd.md) +- [Customizing Fedora minimal templates](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/fedora-minimal-template-customization.md) +- [Customizing Windows 7 templates](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/windows-template-customization.md) +- [Debian templates](https://www.qubes-os.org/doc/templates/debian/) +- [Fedora templates](https://www.qubes-os.org/doc/templates/fedora/) +- [Minimal templates](https://www.qubes-os.org/doc/templates/minimal/) +- [Pentesting: BlackArch](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/blackarch.md) +- [Pentesting: Kali](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/kali.md) +- [Pentesting: PTF](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/ptf.md) +- [Pentesting: Parrot](https://www.parrotsec.org/docs/parrot-on-qubesos.html) +- [Template: CentOS](https://github.com/Qubes-Community/Contents/blob/master/docs/os/centos.md) +- [Template: Gentoo](https://github.com/Qubes-Community/Contents/blob/master/docs/os/gentoo.md) +- [Template: Ubuntu](https://github.com/Qubes-Community/Contents/blob/master/docs/os/ubuntu.md) +- [Template: Whonix](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/whonix.md) +- [Template: Windows](https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows-vm.md) +- [Templates](https://www.qubes-os.org/doc/templates/) +- [Tips for Using Linux in an HVM](https://github.com/Qubes-Community/Contents/blob/master/docs/os/linux-hvm-tips.md) +- [Xfce templates](https://www.qubes-os.org/doc/templates/xfce/) -## Qubes OS Server - - [qubes-network-server](https://github.com/Rudd-O/qubes-network-server) - Turn your Qubes OS into a networking server - - [qubes-remote-desktop](https://github.com/QubesOS-contrib/qubes-remote-desktop) - SystemD services for creating VNC server session in dom0 or any qube. - - [Ansible](https://qubes-ansible.readthedocs.io/en/latest/) - Automation with Ansible +## Qubes OS Server + +- [Ansible](https://qubes-ansible.readthedocs.io/en/latest/) - Automation with Ansible. +- [Qubes-network-server](https://github.com/Rudd-O/qubes-network-server) - Turn your Qubes OS into a networking server. +- [Qubes-remote-desktop](https://github.com/QubesOS-contrib/qubes-remote-desktop) - SystemD services for creating VNC server session in dom0 or any qube. ## GPU - - [GUI-domain](https://www.qubes-os.org/doc/gui-domain/) - - [GUI-configuration](https://www.qubes-os.org/doc/gui-configuration/) - - [GUI-troubleshooting](https://www.qubes-os.org/doc/gui-troubleshooting/) - - [GUI-virtualization](https://www.qubes-os.org/doc/gui/) - - [How-to-use-pci-devices](https://www.qubes-os.org/doc/how-to-use-pci-devices/) - - [Nvidia-troubleshooting](https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/nvidia-troubleshooting.md) - - [Install-nvidia-driver](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/install-nvidia-driver.md) - - [Windows-gaming-hvm](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/windows-gaming-hvm.md) -## Desktop Customization - - [KDE (desktop environment)](https://www.qubes-os.org/doc/kde/) - - [i3 (window manager)](https://www.qubes-os.org/doc/i3/) - - [AwesomeWM (window manager)](https://www.qubes-os.org/doc/awesomewm/)) - - [Brightness-ajustment](https://forum.qubes-os.org/t/easy-brightness-adjustment/15902/2) - - [Custom icons](https://forum.qubes-os.org/t/where-is-the-most-optimal-place-to-put-custom-folder-icons/15740/3) - - [Suckless dwm](https://github.com/3o14r473/GUIDE_how-to-install-dwm-in-qubesos) - How to install dwm in Qubes OS +- [GUI-configuration](https://www.qubes-os.org/doc/gui-configuration/) +- [GUI-domain](https://www.qubes-os.org/doc/gui-domain/) +- [GUI-troubleshooting](https://www.qubes-os.org/doc/gui-troubleshooting/) +- [GUI-virtualization](https://www.qubes-os.org/doc/gui/) +- [How-to-use-pci-devices](https://www.qubes-os.org/doc/how-to-use-pci-devices/) +- [Install-nvidia-driver](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/install-nvidia-driver.md) +- [Nvidia-troubleshooting](https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/nvidia-troubleshooting.md) +- [Windows-gaming-hvm](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/windows-gaming-hvm.md) + +## Desktop Customization + +- [AwesomeWM (window manager)](https://www.qubes-os.org/doc/awesomewm/) +- [Brightness-Ajustment](https://forum.qubes-os.org/t/easy-brightness-adjustment/15902/2) +- [Custom icons](https://forum.qubes-os.org/t/where-is-the-most-optimal-place-to-put-custom-folder-icons/15740/3) +- [i3 (window manager)](https://www.qubes-os.org/doc/i3/) +- [KDE (desktop environment)](https://www.qubes-os.org/doc/kde/) +- [Suckless dwm](https://github.com/3o14r473/GUIDE_how-to-install-dwm-in-qubesos) - How to install dwm in Qubes OS. ## VPN - - [How To make a VPN Gateway in Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md) - Qubes includes a number of tools that can make the client-side setup of your VPN more versatile and secure. - - [Mullvad VPN](https://mullvad.net/en/help/qubes-os-4-and-mullvad-vpn/) - Privacy first VPN provider in Qubes OS. - - [qubes-tunnel](https://github.com/QubesOS-contrib/qubes-tunnel) - Manage, run, protect VPN connections in Proxy VMs. - - [WireGuard](https://github.com/Qubes-Community/Contents/tree/master/docs/wireguard) - WireGuard: fast, modern, secure VPN tunnel + +- [How To make a VPN Gateway in Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md) - Qubes includes a number of tools that can make the client-side setup of your VPN more versatile and secure. +- [Qubes-Tunnel](https://github.com/QubesOS-contrib/qubes-tunnel) - Manage, run, protect VPN connections in Proxy VMs. +- [Mullvad VPN](https://mullvad.net/en/help/qubes-os-4-and-mullvad-vpn/) - Privacy first VPN provider in Qubes OS. +- [WireGuard](https://github.com/Qubes-Community/Contents/tree/master/docs/wireguard) - WireGuard: fast, modern, secure VPN tunnel. ## Darknet - - [Whonix](https://www.whonix.org/wiki/Qubes) - Qubes-Whonix ™ is the seamless combination of Qubes OS -and Whonix™ for advanced security and anonymity. - - [i2p-whonix](https://forum.qubes-os.org/t/temporary-way-to-run-i2p-on-qubes-whonix/15861) - Temporary way to run i2p on qubes-whonix - - [Lokinet](https://github.com/oxen-io/lokinet) - Lokinet is the reference implementation of LLARP (low latency anonymous routing protocol), a layer 3 onion routing protocol. - - [ipfs](https://github.com/ipfs/ipfs) - A peer-to-peer hypermedia protocol to make the web faster, safer, and more open. + +- [i2p-whonix](https://forum.qubes-os.org/t/temporary-way-to-run-i2p-on-qubes-whonix/15861) - Temporary way to run i2p on qubes-whonix. +- [ipfs](https://github.com/ipfs/ipfs) - A peer-to-peer hypermedia protocol to make the web faster, safer, and more open. +- [Lokinet](https://github.com/oxen-io/lokinet) - Lokinet is the reference implementation of LLARP (low latency anonymous routing protocol), a layer 3 onion routing protocol. +- [Whonix](https://www.whonix.org/wiki/Qubes) - Qubes-Whonix ™ is the seamless combination of Qubes OS and Whonix™ for advanced security and anonymity. ## Crypto - - [awesome-desci](https://github.com/DeSciWorldDAO/awesome-desci) - A curated list of awesome Decentralized Science (DeSci) resources, projects, articles and more. - - [Split Bitcoin Wallet](https://github.com/Qubes-Community/Contents/blob/master/docs/security/split-bitcoin.md) - A "split" bitcoin wallet is a strategy of protecting your bitcoin by having your wallet split into an offline "cold storage" wallet and an online "watching only" wallet. + +- [Split Bitcoin Wallet](https://github.com/Qubes-Community/Contents/blob/master/docs/security/split-bitcoin.md) - A "split" bitcoin wallet is a strategy of protecting your bitcoin by having your wallet split into an offline "cold storage" wallet and an online "watching only" wallet. +- [Awesome-DeSci](https://github.com/DeSciWorldDAO/awesome-desci) - A curated list of awesome Decentralized Science (DeSci) resources, projects, articles and more. ## Videos - - [3mdeb](https://3mdeb.com/) - - [Qubes OS summit 2022: Day 1](https://www.youtube.com/watch?v=hkWWz3xGqS8) - - [Qubes OS summit 2022: Day 2](https://www.youtube.com/watch?v=A9GrlQsQc7Q) - - [Qubes OS-3mdeb mini-summit 2021: Day 1](https://www.youtube.com/watch?v=y3V_V0Vllas) - - [Qubes OS-3mdeb mini-summit 2021: Day 2](https://www.youtube.com/watch?v=KdDr6TiqF0k) - - [GPU Virtual Machine (GVM) - An OpenMdev Project (Qubes OS Summit 2022)](https://www.youtube.com/watch?v=YllX-ud70Nk) - - [Micah Lee presents “Qubes OS: The Operating System That Can Protect You Even If You Get Hacked”](https://livestream.com/accounts/9197973/events/8286152/videos/178431606) - - [Explaining Computers presents “Qubes OS: Security Oriented Operating System”](https://www.youtube.com/watch?v=hWDvS_Mp6gc) - - [ninavizz](https://vimeo.com/user1589693) - Qubes OS UX Designer - - [UX Jackie](https://vimeo.com/541946756) - Qubes OS AppMenu Design Direction. Part of 2020/21 MOSS funded UX work. - - [UX Bessie](https://vimeo.com/542041258) - Qubes OS AppMenu Design Direction. Part of 2020/21 MOSS funded UX work. - - [GPU Virtual Machine (GVM) - An OpenMdev Project (Qubes OS Summit 2022)](https://www.youtube.com/watch?v=YllX-ud70Nk) + +- [3mdeb](https://3mdeb.com/) +- [Explaining Computers presents “Qubes OS: Security Oriented Operating System”](https://www.youtube.com/watch?v=hWDvS_Mp6gc) +- [GPU Virtual Machine (GVM) - An OpenMdev Project (Qubes OS Summit 2022)](https://www.youtube.com/watch?v=YllX-ud70Nk) +- [GPU Virtual Machine (GVM) - An OpenMdev Project (Qubes OS Summit 2022)](https://www.youtube.com/watch?v=YllX-ud70Nk) +- [Micah Lee presents “Qubes OS: The Operating System That Can Protect You Even If You Get Hacked”](https://livestream.com/accounts/9197973/events/8286152/videos/178431606) +- [Ninavizz](https://vimeo.com/user1589693) - Qubes OS UX Designer. +- [Qubes OS summit 2022: Day 1](https://www.youtube.com/watch?v=hkWWz3xGqS8) +- [Qubes OS summit 2022: Day 2](https://www.youtube.com/watch?v=A9GrlQsQc7Q) +- [Qubes OS-3mdeb mini-summit 2021: Day 1](https://www.youtube.com/watch?v=y3V_V0Vllas) +- [Qubes OS-3mdeb mini-summit 2021: Day 2](https://www.youtube.com/watch?v=KdDr6TiqF0k) +- [UX Bessie](https://vimeo.com/542041258) - Qubes OS AppMenu Design Direction. Part of 2020/21 MOSS funded UX work. +- [UX Jackie](https://vimeo.com/541946756) - Qubes OS AppMenu Design Direction. Part of 2020/21 MOSS funded UX work. ## Security - - [Firewall](https://www.qubes-os.org/doc/firewall/) - - [Data leaks](https://www.qubes-os.org/doc/data-leaks/) - - [Passwordless root access in qubes](https://www.qubes-os.org/doc/vm-sudo/) - - [Device handling security](https://www.qubes-os.org/doc/device-handling-security/) - - [Anti evil maid (AEM)](https://www.qubes-os.org/doc/anti-evil-maid/) - - [Split GPG](https://www.qubes-os.org/doc/split-gpg/) - - [U2F proxy](https://www.qubes-os.org/doc/u2f-proxy/) - - [YubiKey](https://www.qubes-os.org/doc/yubikey/) - - [Using Multi-Factor Authentication with Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/security/multifactor-authentication.md) - - [Split dm-crypt](https://github.com/rustybird/qubes-split-dm-crypt) - - [Split SSH](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/split-ssh.md) - - [Using OnlyKey with Qubes OS](https://docs.crp.to/qubes.html) - - [Whonix for Privacy & Anonymity](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/whonix.md) - - [Running Tails in Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/tails.md) - - [Anonymizing your MAC Address](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/anonymizing-your-mac-address.md) - - [Signal](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/signal.md) - - [Reducing the fingerprint of the text-based web browser w3m](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/w3m.md) + +- [Anonymizing your MAC Address](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/anonymizing-your-mac-address.md) +- [Anti evil maid (AEM)](https://www.qubes-os.org/doc/anti-evil-maid/) +- [Data leaks](https://www.qubes-os.org/doc/data-leaks/) +- [Device handling security](https://www.qubes-os.org/doc/device-handling-security/) +- [Firewall](https://www.qubes-os.org/doc/firewall/) +- [Passwordless root access in Qubes](https://www.qubes-os.org/doc/vm-sudo/) +- [Reducing the fingerprint of the text-based web browser w3m](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/w3m.md) +- [Running Tails in Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/tails.md) +- [Signal](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/signal.md) +- [Split GPG](https://www.qubes-os.org/doc/split-gpg/) +- [Split SSH](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/split-ssh.md) +- [Split dm-crypt](https://github.com/rustybird/qubes-split-dm-crypt) +- [U2F proxy](https://www.qubes-os.org/doc/u2f-proxy/) +- [Using Multi-Factor Authentication with Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/security/multifactor-authentication.md) +- [Using OnlyKey with Qubes OS](https://docs.crp.to/qubes.html) +- [Whonix for Privacy & Anonymity](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/whonix.md) +- [YubiKey](https://www.qubes-os.org/doc/yubikey/) ## Vitualization - - [awesome-virtualization](https://github.com/Wenzel/awesome-virtualization) - A curated list of awesome resources about virtualization. + +- [Awesome-Virtualization](https://github.com/Wenzel/awesome-virtualization) - A curated list of awesome resources about virtualization. ## Kernels - - [eBPF](https://ebpf.io) - eBPF is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in an operating system kernel. - - [Sel4](https://sel4.systems/) - seL4 is a high-assurance, high-performance operating system microkernel. - - [OpenXT](https://openxt.org/) - OpenXT is an open-source development toolkit for hardware-assisted security research and appliance integration + +- [eBPF](https://ebpf.io) - eBPF is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in an operating system kernel. +- [OpenXT](https://openxt.org/) - OpenXT is an open-source development toolkit for hardware-assisted security research and appliance integration. +- [seL4](https://sel4.systems/) - seL4 is a high-assurance, high-performance operating system microkernel. ## Unikernels - - [Awesome-unikernels](https://github.com/uniqernel/awesome-unikernels) - Secure, lightweight and high performance approach to application delivery - - [ qubes-mirage-firewall](https://github.com/mirage/qubes-mirage-firewall) - A unikernel that can run as a Qubes OS ProxyVM, replacing sys-firewall. - - [ClickOS](http://cnp.neclab.eu/projects/clickos) - Efficient network function virtualization platform, optimized for Xen and developed by NEC. - - [Clive](http://lsub.org/ls/clive.html) - Research project from Rey Juan Carlos University (Madrid), developed in Go. - - [Mini-OS](https://wiki.xen.org/wiki/Mini-OS) - Reference kernel distributed with Xen. - - [HaLVM](https://galois.com/project/halvm) - Port of Glasgow Haskell compiler producing Xen optimized unikernels. + +- [Awesome-Unikernels](https://github.com/uniqernel/awesome-unikernels) - Secure, lightweight and high performance approach to application delivery. +- [ClickOS](http://cnp.neclab.eu/projects/clickos) - Efficient network function virtualization platform, optimized for Xen and developed by NEC. +- [Clive](http://lsub.org/ls/clive.html) - Research project from Rey Juan Carlos University (Madrid), developed in Go. +- [HaLVM](https://galois.com/project/halvm) - Port of Glasgow Haskell compiler producing Xen optimized unikernels. +- [Mini-OS](https://wiki.xen.org/wiki/Mini-OS) - Reference kernel distributed with Xen. +- [Qubes-Mirage-Firewall](https://github.com/mirage/qubes-mirage-firewall) - A unikernel that can run as a Qubes OS ProxyVM, replacing sys-firewall. ## Unikernel-like - - [Drawbridge](https://www.microsoft.com/en-us/research/project/drawbridge) - Research prototype platform from Microsoft. - - [Graphene](https://github.com/oscarlab/graphene) - Library OS optimized for Intel SGX. + +- [Drawbridge](https://www.microsoft.com/en-us/research/project/drawbridge) - Research prototype platform from Microsoft. +- [Graphene](https://github.com/oscarlab/graphene) - Library OS optimized for Intel SGX. ## Exploitation Tools - - [libvmi](https://libvmi.com/) - LibVMI is a C library with Python bindings that makes it easy to monitor the low-level details of a running virtual machine - - [microlibvmi](https://github.com/Wenzel/libmicrovmi) - A cross-platform unified Virtual Machine Introspection API library - - [radare2](https://github.com/radareorg/radare2) - Libre Reversing Framework for Unix Geeks - - [American Fuzzy Lop](https://github.com/google/AFL) - Fuzzing is one of the most powerful and proven strategies for identifying security issues in real-world software - - [Bonzai](https://github.com/rwxrob/bonzai) - It's like a modular, multicall BusyBox builder for Go with built in completion and embedded documentation support. - - [CodeQL](https://codeql.github.com/) - Discover vulnerabilities across a codebase with CodeQL - - [joern](https://github.com/joernio/joern) - Joern is a platform for analyzing source code, bytecode, and binary executables. It generates code property graphs (CPGs), a graph representation of code for cross-language code analysis - - [awesome-fuzzing](https://github.com/cpuu/awesome-fuzzing) - A curated list of references to awesome Fuzzing for security testing. Additionally there is a collection of freely available academic papers, tools and so on. - - [Volatility3](https://github.com/volatilityfoundation/volatility3) - Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples. - - [MemProFS](https://github.com/ufrisk/MemProcFS) - MemProcFS is an easy and convenient way of viewing physical memory as files in a virtual file system. - - - [MemProcFS](https://github.com/ufrisk/MemProcFS-plugins) - This repository contains various non-core plugins for MemProcFS - The Memory Process File System. - - - [LeechCore](https://github.com/ufrisk/LeechCore) - The LeechCore Memory Acquisition Library focuses on Physical Memory Acquisition using various hardware and software based methods. - - - [LeechCore-pluins](https://github.com/ufrisk/LeechCore-plugins) - This repository contains various plugins for LeechCore - Physical Memory Acquisition Library. - - [memflow](https://github.com/memflow/memflow) - memflow is a library that enables introspection of various machines (hardware, virtual machines, memory dumps) in a generic fashion. - - - [qemu_procfs](https://github.com/memflow/memflow-qemu-procfs) - access QEMU Physical memory - - [Kvm](https://github.com/memflow/memflow-kvm) - kvm memflow connector - - [pcileech](https://github.com/memflow/memflow-pcileech) - access pcileech interface - - [coredump](https://github.com/memflow/memflow-coredump) - access Microsoft Windows Coredump files + +- [American Fuzzy Lop](https://github.com/google/AFL) - Fuzzing is one of the most powerful and proven strategies for identifying security issues in real-world software +- [Awesome-Fuzzing](https://github.com/cpuu/awesome-fuzzing) - A curated list of references to awesome Fuzzing for security testing. Additionally there is a collection of freely available academic papers, tools and so on. +- [Bonzai](https://github.com/rwxrob/bonzai) - It's like a modular, multicall BusyBox builder for Go with built in completion and embedded documentation support. +- [CodeQL](https://codeql.github.com/) - Discover vulnerabilities across a codebase with CodeQL +- [Joern](https://github.com/joernio/joern) - Joern is a platform for analyzing source code, bytecode, and binary executables. It generates code property graphs (CPGs), a graph representation of code for cross-language code analysis +- [LeechCore](https://github.com/ufrisk/LeechCore) - The LeechCore Memory Acquisition Library focuses on Physical Memory Acquisition using various hardware and software based methods. + - [LeechCore-Plugins](https://github.com/ufrisk/LeechCore-plugins) - This repository contains various plugins for LeechCore - Physical Memory Acquisition Library. +- [Libvmi](https://libvmi.com/) - LibVMI is a C library with Python bindings that makes it easy to monitor the low-level details of a running virtual machine. +- [Memflow](https://github.com/memflow/memflow) - memflow is a library that enables introspection of various machines (hardware, virtual machines, memory dumps) in a generic fashion. + - [Qemu_procfs](https://github.com/memflow/memflow-qemu-procfs) - Access QEMU Physical memory. + - [Kvm](https://github.com/memflow/memflow-kvm) - KVM memflow connector. + - [Pcileech](https://github.com/memflow/memflow-pcileech) - Access pcileech interface. + - [Coredump](https://github.com/memflow/memflow-coredump) - Access Microsoft Windows Coredump files +- [MemProFS](https://github.com/ufrisk/MemProcFS) - MemProcFS is an easy and convenient way of viewing physical memory as files in a virtual file system. + - [MemProcFS](https://github.com/ufrisk/MemProcFS-plugins) - This repository contains various non-core plugins for MemProcFS - The Memory Process File System. +- [Microlibvmi](https://github.com/Wenzel/libmicrovmi) - A cross-platform unified Virtual Machine Introspection API library. +- [Radare2](https://github.com/radareorg/radare2) - Libre Reversing Framework for Unix Geeks +- [Volatility3](https://github.com/volatilityfoundation/volatility3) - Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples. ## Xen Exploitation - - [Ouroboros: Tearing Xen Hypervisor With the Snake](https://www.youtube.com/watch?v=kt3kX94kWcM) - - [Subverting the Xen hypervisor](https://invisiblethingslab.com/resources/bh08/part1.pdf) - - [Preventing and Detecting Xen Hypervisor Subversions](https://invisiblethingslab.com/resources/bh08/part2.pdf) - - [Bluepilling the Xen Hypervisor](https://invisiblethingslab.com/resources/bh08/part3.pdf) - - [XenPwn: Breaking paravirtualized devices](https://www.youtube.com/watch?v=qxz8MzE3QME) - [[Slide]](https://www.blackhat.com/docs/us-16/materials/us-16-Wilhelm-Xenpwn-Breaking-Paravirtualized-Devices-wp.pdf) - - [Advanced Exploitation: Xen Hypervisor VM Escape ](https://www.youtube.com/watch?v=6Ld5CiInrcI) - - [Xen exploitation part 1: XSA-105, from nobody to root](https://blog.quarkslab.com/xen-exploitation-part-1-xsa-105-from-nobody-to-root.html) - - [Xen exploitation part 2: XSA-148, from guest to host](https://blog.quarkslab.com/xen-exploitation-part-2-xsa-148-from-guest-to-host.html) - - [Blackhat 2010 - Hacking the Hypervisor](https://www.youtube.com/watch?v=sTC9x5hYYFo&t=3s) - - [Software Attacks on Hypervisor Emulation of Hardware](https://www.youtube.com/watch?v=c4DnlP88D2Y) - [[Slides]](https://www.troopers.de/downloads/troopers17/TR17_Attacking_hypervisor_through_hardwear_emulation.pdf) - - [Lessons Learned from Eight Years of Breaking Hypervisors](https://www.youtube.com/watch?v=PJWJjb0uxXE) - [[Slides]](https://www.blackhat.com/docs/eu-14/materials/eu-14-Wojtczuk-Lessons-Learned-From-Eight-Years-Of-Breaking-Hypervisors.pdf) - - [Attacking Hypervisors Using Firmware And Hardware](https://www.youtube.com/watch?v=nyW3eTobXAI) - [[Slides]](http://c7zero.info/stuff/AttackingHypervisorsViaFirmware_bhusa15_dc23.pdf) - - [The Arms Race Over Virtualization](https://www.youtube.com/watch?v=nWvg7NKwOjg) - [[Slides]](https://www.blackhat.com/docs/us-16/materials/us-16-Luan-Ouroboros-Tearing-Xen-Hypervisor-With-The-Snake.pdf) - - [Glitches in the Matrix – Escape via NMI](https://www.cpl0.com/blog/?p=46) - - [Hypervisor Vulnerability Research - State of the Art](https://alisa.sh/slides/HypervisorVulnerabilityResearch2020.pdf) +- [Advanced Exploitation: Xen Hypervisor VM Escape](https://www.youtube.com/watch?v=6Ld5CiInrcI) +- [Attacking Hypervisors Using Firmware And Hardware](https://www.youtube.com/watch?v=nyW3eTobXAI) - [[Slides]](http://c7zero.info/stuff/AttackingHypervisorsViaFirmware_bhusa15_dc23.pdf) +- [Blackhat 2010 - Hacking the Hypervisor](https://www.youtube.com/watch?v=sTC9x5hYYFo&t=3s) +- [Bluepilling the Xen Hypervisor](https://invisiblethingslab.com/resources/bh08/part3.pdf) +- [Glitches in the Matrix – Escape via NMI](https://www.cpl0.com/blog/?p=46) +- [Hypervisor Vulnerability Research - State of the Art](https://alisa.sh/slides/HypervisorVulnerabilityResearch2020.pdf) +- [Lessons Learned from Eight Years of Breaking Hypervisors](https://www.youtube.com/watch?v=PJWJjb0uxXE) - [[Slides]](https://www.blackhat.com/docs/eu-14/materials/eu-14-Wojtczuk-Lessons-Learned-From-Eight-Years-Of-Breaking-Hypervisors.pdf) +- [Ouroboros: Tearing Xen Hypervisor With the Snake](https://www.youtube.com/watch?v=kt3kX94kWcM) +- [Preventing and Detecting Xen Hypervisor Subversions](https://invisiblethingslab.com/resources/bh08/part2.pdf) +- [Software Attacks on Hypervisor Emulation of Hardware](https://www.youtube.com/watch?v=c4DnlP88D2Y) - [[Slides]](https://www.troopers.de/downloads/troopers17/TR17_Attacking_hypervisor_through_hardwear_emulation.pdf) +- [Subverting the Xen Hypervisor](https://invisiblethingslab.com/resources/bh08/part1.pdf) +- [The Arms Race Over Virtualization](https://www.youtube.com/watch?v=nWvg7NKwOjg) - [[Slides]](https://www.blackhat.com/docs/us-16/materials/us-16-Luan-Ouroboros-Tearing-Xen-Hypervisor-With-The-Snake.pdf) +- [Xen exploitation part 1: XSA-105, from nobody to root](https://blog.quarkslab.com/xen-exploitation-part-1-xsa-105-from-nobody-to-root.html) +- [Xen exploitation part 2: XSA-148, from guest to host](https://blog.quarkslab.com/xen-exploitation-part-2-xsa-148-from-guest-to-host.html) +- [XenPwn: Breaking Paravirtualized Devices](https://www.youtube.com/watch?v=qxz8MzE3QME) - [[Slide]](https://www.blackhat.com/docs/us-16/materials/us-16-Wilhelm-Xenpwn-Breaking-Paravirtualized-Devices-wp.pdf) ## VM-Hardening - - [Qubes-VM-hardening](https://github.com/tasket/Qubes-VM-hardening) - - [Kicksecure](https://www.kicksecure.com/wiki/Kicksecure-Qubes_Security) - - [qcrypt](https://github.com/3hhh/qcrypt) - + +- [Kicksecure](https://www.kicksecure.com/wiki/Kicksecure-Qubes_Security) +- [Qcrypt](https://github.com/3hhh/qcrypt) +- [Qubes-VM-hardening](https://github.com/tasket/Qubes-VM-hardening) ## System - - [Architecture](https://www.qubes-os.org/doc/architecture/) - - [Security design goals](https://www.qubes-os.org/doc/security-design-goals/) - - [Security-critical code](https://www.qubes-os.org/doc/security-critical-code/) - - [Qubes core admin](https://www.qubes-os.org/doc/qubes-core-admin/) - - [Qubes core admin client](https://www.qubes-os.org/doc/qubes-core-admin-client/) - - [Qubes core stack](https://www.qubes-os.org/doc/qubes-core-stack/) - - [Networking](https://www.qubes-os.org/doc/networking/) - - [Template implementation](https://www.qubes-os.org/doc/template-implementation/) - - [Storage pools](https://www.qubes-os.org/doc/storage-pools/) - - [Audio virtualization](https://www.qubes-os.org/doc/audio-virtualization/) - - [Template manager](https://www.qubes-os.org/doc/template-manager/) + +- [Architecture](https://www.qubes-os.org/doc/architecture/) +- [Audio virtualization](https://www.qubes-os.org/doc/audio-virtualization/) +- [Networking](https://www.qubes-os.org/doc/networking/) +- [Qubes core admin client](https://www.qubes-os.org/doc/qubes-core-admin-client/) +- [Qubes core admin](https://www.qubes-os.org/doc/qubes-core-admin/) +- [Qubes core stack](https://www.qubes-os.org/doc/qubes-core-stack/) +- [Security design goals](https://www.qubes-os.org/doc/security-design-goals/) +- [Security-critical code](https://www.qubes-os.org/doc/security-critical-code/) +- [Storage pools](https://www.qubes-os.org/doc/storage-pools/) +- [Template implementation](https://www.qubes-os.org/doc/template-implementation/) +- [Template manager](https://www.qubes-os.org/doc/template-manager/) ## Services - - [Inter-qube file copying (qfilecopy)](https://www.qubes-os.org/doc/qfilecopy/) - - [Qubes memory manager (qmemman)](https://www.qubes-os.org/doc/qmemman/) - - [Dom0 secure updates](https://www.qubes-os.org/doc/dom0-secure-updates/) - - [Qrexec: secure communication across domains](https://www.qubes-os.org/doc/qrexec/) - - [Qrexec: Qubes RPC internals](https://www.qubes-os.org/doc/qrexec-internals/) - - [Qrexec: socket-based services](https://www.qubes-os.org/doc/qrexec-socket-services/) - - [Admin API](https://www.qubes-os.org/doc/admin-api/) +- [Admin API](https://www.qubes-os.org/doc/admin-api/) +- [Dom0 secure updates](https://www.qubes-os.org/doc/dom0-secure-updates/) +- [Inter-qube file copying (qfilecopy)](https://www.qubes-os.org/doc/qfilecopy/) +- [Qrexec: Qubes RPC internals](https://www.qubes-os.org/doc/qrexec-internals/) +- [Qrexec: secure communication across domains](https://www.qubes-os.org/doc/qrexec/) +- [Qrexec: socket-based services](https://www.qubes-os.org/doc/qrexec-socket-services/) +- [Qubes memory manager (qmemman)](https://www.qubes-os.org/doc/qmemman/) ## Advanced Topics - - [How to install software in dom0](https://www.qubes-os.org/doc/how-to-install-software-in-dom0/) - - [Volume backup and revert](https://www.qubes-os.org/doc/volume-backup-revert/) - - [Standalones and HVMs](https://www.qubes-os.org/doc/standalones-and-hvms/) - - [Windows qubes](https://www.qubes-os.org/doc/windows/) - - [Config files](https://www.qubes-os.org/doc/config-files/) - - [Secondary storage](https://www.qubes-os.org/doc/secondary-storage/) - - [RPC policies](https://www.qubes-os.org/doc/rpc-policy/) - - [USB qubes](https://www.qubes-os.org/doc/usb-qubes/) - - [Managing qube kernels](https://www.qubes-os.org/doc/managing-vm-kernels/) - - [Salt (management software)](https://www.qubes-os.org/doc/salt/) - - [Disposable customization](https://www.qubes-os.org/doc/disposable-customization/) - - [Installing contributed packages](https://www.qubes-os.org/doc/installing-contributed-packages/) - - [How to make any file persistent (bind-dirs)](https://www.qubes-os.org/doc/bind-dirs/) - - [Resize disk image](https://www.qubes-os.org/doc/resize-disk-image/) - - [Qubes service](https://www.qubes-os.org/doc/qubes-service/) - - [How to mount a Qubes partition from another OS](https://www.qubes-os.org/doc/mount-from-other-os/) + +- [Config files](https://www.qubes-os.org/doc/config-files/) +- [Disposable customization](https://www.qubes-os.org/doc/disposable-customization/) +- [How to install software in dom0](https://www.qubes-os.org/doc/how-to-install-software-in-dom0/) +- [How to make any file persistent (bind-dirs)](https://www.qubes-os.org/doc/bind-dirs/) +- [How to mount a Qubes partition from another OS](https://www.qubes-os.org/doc/mount-from-other-os/) +- [Installing contributed packages](https://www.qubes-os.org/doc/installing-contributed-packages/) +- [Managing qube kernels](https://www.qubes-os.org/doc/managing-vm-kernels/) +- [Qubes service](https://www.qubes-os.org/doc/qubes-service/) +- [RPC policies](https://www.qubes-os.org/doc/rpc-policy/) +- [Resize disk image](https://www.qubes-os.org/doc/resize-disk-image/) +- [Salt (management software)](https://www.qubes-os.org/doc/salt/) +- [Secondary storage](https://www.qubes-os.org/doc/secondary-storage/) +- [Standalones and HVMs](https://www.qubes-os.org/doc/standalones-and-hvms/) +- [USB qubes](https://www.qubes-os.org/doc/usb-qubes/) +- [Volume backup and revert](https://www.qubes-os.org/doc/volume-backup-revert/) +- [Windows qubes](https://www.qubes-os.org/doc/windows/) ## Qubes OS Legends - - [Joanna Rutkowska](https://en.wikipedia.org/wiki/Joanna_Rutkowska) - Founder of Qubes OS. - - [Marek Marczykowski-Górecki](https://github.com/marmarek) - Lead developer at Qubes OS. - - [unman](https://github.com/unman?tab=repositories) - - [templates](https://qubes.3isec.org/Templates_4.1/) - - [Core Team](https://www.qubes-os.org/team/#core-team) - - You can be one too! You've got this! Keep Qubing! + +- [Core Team](https://www.qubes-os.org/team/#core-team) +- [Joanna Rutkowska](https://en.wikipedia.org/wiki/Joanna_Rutkowska) - Founder of Qubes OS. +- [Marek Marczykowski-Górecki](https://github.com/marmarek) - Lead developer at Qubes OS. +- [Unman](https://github.com/unman?tab=repositories) + - [templates](https://qubes.3isec.org/Templates_4.1/) +- You can be one too! You've got this! Keep Qubing! ## Training - - [xn0px90](https://patreon.com/xn0px90) - Every second and fourth weekends of every month, from Friday to Monday, covering beginner, intermediate, and advanced levels. + +- [xn0px90](https://patreon.com/xn0px90) - Qubes training every second and fourth weekends of every month, from Friday to Monday, covering beginner, intermediate, and advanced levels. ## Streamers - - [xn0px90](https://twitch.tv/xn0px90) - Your's::Trully!::First::Full::Time::Info::Sec::Qubes::OS::Streamer! - - [infosecstreams](https://infosecstreams.com/) - An actively maintained activity-based-autosorted list of InfoSec Streamers. + +- [infosecstreams](https://infosecstreams.com/) - An actively maintained activity-based-autosorted list of InfoSec Streamers. +- [xn0px90](https://twitch.tv/xn0px90) - Your's::Trully!::First::Full::Time::Info::Sec::Qubes::OS::Streamer! ## Companies using Qubes OS - - [Qubes Partners](https://www.qubes-os.org/partners/) - The Qubes Project relies greatly on the generous support of the organizations, companies, and individuals who have become Qubes Partners. + +- [Qubes Partners](https://www.qubes-os.org/partners/) - The Qubes Project relies greatly on the generous support of the organizations, companies, and individuals who have become Qubes Partners. ## Social media + The Qubes OS Project has a presence on the following social media platforms: - - [Forum](https://forum.qubes-os.org/) - - [Mastodon](https://mastodon.social/@QubesOS) - - [Twitter](https://twitter.com/QubesOS) - - [Reddit](https://www.reddit.com/r/Qubes/) - - [Facebook](https://www.facebook.com/QubesOS/) - - [LinkedIn](https://www.linkedin.com/company/qubes-os/) - - [Discord](https://discord.gg/YMUbTt7ZRG) - - [Matrix Discord Bridge](https://matrix.to/#/#qubes-os-discord-bridge-v2:matrix.org) - - [Matrix:Qubes OS](https://matrix.to/#/#cybersec-qubes_os:matrix.org) - - [ClubHouse](https://www.clubhouse.com/house/qubes-os) - - `#qubes` channel on libera.chat via traditional IRC clients. - - `#qubes-os` channel on irc.anonops.com via traditional IRC clients. + +- [ClubHouse](https://www.clubhouse.com/house/qubes-os) +- [Discord](https://discord.gg/YMUbTt7ZRG) +- [Facebook](https://www.facebook.com/QubesOS/) +- [Forum](https://forum.qubes-os.org/) +- [LinkedIn](https://www.linkedin.com/company/qubes-os/) +- [Mastodon](https://mastodon.social/@QubesOS) +- [Matrix Discord Bridge](https://matrix.to/#/#qubes-os-discord-bridge-v2:matrix.org) +- [Matrix:Qubes OS](https://matrix.to/#/#cybersec-qubes_os:matrix.org) +- [Reddit](https://www.reddit.com/r/Qubes/) +- [Twitter](https://twitter.com/QubesOS) +- `#qubes` channel on libera.chat via traditional IRC clients. +- `#qubes-os` channel on irc.anonops.com via traditional IRC clients. ## Contributing + Contribution guidelines can be found [here](https://github.com/xn0px90/Awesome-Qubes-OS/blob/master/CONTRIBUTING.md). ## Releases - - [Supported releases](https://www.qubes-os.org/doc/supported-releases/) - - [Testing new releases and updates](https://www.qubes-os.org/doc/testing/) - - [Release notes](https://www.qubes-os.org/doc/releases/notes/) - - [Release schedules](https://www.qubes-os.org/doc/releases/schedules/) +- [Release notes](https://www.qubes-os.org/doc/releases/notes/) +- [Release schedules](https://www.qubes-os.org/doc/releases/schedules/) +- [Supported releases](https://www.qubes-os.org/doc/supported-releases/) +- [Testing new releases and updates](https://www.qubes-os.org/doc/testing/) ## Adventure Further - - [Adventures start here --->](https://github.com/sindresorhus/awesome) - All the awesome list. -**[⬆ back to top](#)** + +- [Adventures start here --->](https://github.com/sindresorhus/awesome) - All the awesome list. +**[⬆ back to top](#awesome-qubes-os)** ## License [![Creative Commons License](http://i.creativecommons.org/l/by/1.0/88x31.png)](https://creativecommons.org/licenses/by/1.0/) This work is licensed under a [Creative Commons Attribution 1.0 Generic](http://creativecommons.org/licenses/by/1.0/). - + :|: ADVENTURE FURTHER :|: HACK ALL THE THINGS :|: TRUST NOTHING :|: WITH <3! ~X