Merge pull request #5 from projectdp/main

Fixes to README.md and CONTRIBUTING.md
This commit is contained in:
xn0px90 2023-01-11 11:49:23 +00:00 committed by GitHub
commit ff11e1333c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 21 additions and 21 deletions

View File

@ -1,6 +1,6 @@
# Contribution Guidelines
> The pull request should have a useful title. Pull requests with `Update readme.md` as title will be closed right away. Please make sure you checked every box in the PR template.
> The pull request should have a useful title. Pull requests with `Update README.md` as title will be closed right away. Please make sure you checked every box in the PR template.
## Before adding something to the list
@ -8,16 +8,16 @@
2. Add your item to the category it belongs to. Try to avoid creating completely new categories.
3. Make sure your item is added in the correct alphabetical order for its section.
4. Don't submit dead links and try to always submit HTTPS links.
5. Make sure you're linking to an English resource, other languages not allowed *at this moment*
5. Make sure you're linking to an English resource, other languages not allowed *at this moment*.
### Adding an item to the list
1. Click README.md
2. Click the *pencil button* in the upper right corner next to raw | blame | history
1. Click README.md.
2. Click the *pencil button* in the upper right corner next to raw | blame | history.
3. Github will automatically create a fork for this repo on your account.
4. Put your edit in.
5. At the bottom of the page fill in a meaningful commit summary and click *Propose file change*.
6. You'll be taken to the PR screen, click the *Create Pull Request* button
7. Make sure you check the boxes (and actually make sure they're right) and click *Create Pull Request*
6. You'll be taken to the PR screen, click the *Create Pull Request* button.
7. Make sure you check the boxes (and actually make sure they're right) and click *Create Pull Request*.
Submitted PRs will be checked as soon as possible.

View File

@ -75,10 +75,10 @@ Contributions *very welcome* but first see [Contributing](#contributing).
## Qubes OS Websites
- [Qubes OS](https://www.qubes-os.org) - Qubes OS is an operating system built out of securely-isolated compartments called qubes.
- [Qubes OS](https://www.qubes-os.org) - Qubes OS is an operating system built out of securely-isolated compartments called Qubes.
- [Qubes OS Development Documentation](https://dev.qubes-os.org/en/latest/) - Qubes OS development documentation.
- [Qubes OS Documentation](https://www.qubes-os.org/doc/) - Qubes OS main documentation.
- [Qubes OS Github Documentation](https://github.com/QubesOS/qubes-doc) - Qubes OS github latest documentation.
- [Qubes OS GitHub Documentation](https://github.com/QubesOS/qubes-doc) - Qubes OS GitHub latest documentation.
- [Qubes OS News](https://www.qubes-os.org/news/) - Latest Qubes OS News.
- [Qubes OS Onion](http://www.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion) - Qubes OS onion address on the Tor network.
@ -219,9 +219,9 @@ Contributions *very welcome* but first see [Contributing](#contributing).
## Kernels
- [Qubes-linux-kernel](https://github.com/QubesOS/qubes-linux-kernel) - Qubes package for Linux kernel
- [eBPF](https://ebpf.io) - eBPF is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in an operating system kernel.
- [OpenXT](https://openxt.org/) - OpenXT is an open-source development toolkit for hardware-assisted security research and appliance integration.
- [Qubes-linux-kernel](https://github.com/QubesOS/qubes-linux-kernel) - Qubes package for Linux kernel.
- [seL4](https://sel4.systems/) - seL4 is a high-assurance, high-performance operating system microkernel.
## Unikernels
@ -243,22 +243,22 @@ Contributions *very welcome* but first see [Contributing](#contributing).
- [American Fuzzy Lop](https://github.com/google/AFL) - Fuzzing is one of the most powerful and proven strategies for identifying security issues in real-world software
- [Awesome-Fuzzing](https://github.com/cpuu/awesome-fuzzing) - A curated list of references to awesome Fuzzing for security testing. Additionally there is a collection of freely available academic papers, tools and so on.
- [Bonzai](https://github.com/rwxrob/bonzai) - It's like a modular, multicall BusyBox builder for Go with built in completion and embedded documentation support.
- [CodeQL](https://codeql.github.com/) - Discover vulnerabilities across a codebase with CodeQL
- [Joern](https://github.com/joernio/joern) - Joern is a platform for analyzing source code, bytecode, and binary executables. It generates code property graphs (CPGs), a graph representation of code for cross-language code analysis
- [CodeQL](https://codeql.github.com/) - Discover vulnerabilities across a codebase with CodeQL.
- [Joern](https://github.com/joernio/joern) - Joern is a platform for analyzing source code, bytecode, and binary executables. It generates code property graphs (CPGs), a graph representation of code for cross-language code analysis.
- [LeechCore](https://github.com/ufrisk/LeechCore) - The LeechCore Memory Acquisition Library focuses on Physical Memory Acquisition using various hardware and software based methods.
- [LeechCore-Plugins](https://github.com/ufrisk/LeechCore-plugins) - This repository contains various plugins for LeechCore - Physical Memory Acquisition Library.
- [Libvmi](https://libvmi.com/) - LibVMI is a C library with Python bindings that makes it easy to monitor the low-level details of a running virtual machine.
- [Memflow](https://github.com/memflow/memflow) - memflow is a library that enables introspection of various machines (hardware, virtual machines, memory dumps) in a generic fashion.
- [Unicorn](https://www.unicorn-engine.org/) - Unicorn is a lightweight multi-platform, multi-architecture CPU emulator framework.
- [Capstone](https://www.capstone-engine.org/) - Capstone is a lightweight multi-platform, multi-architecture disassembly framework.
- [Qemu_procfs](https://github.com/memflow/memflow-qemu-procfs) - Access QEMU Physical memory.
- [Coredump](https://github.com/memflow/memflow-coredump) - Access Microsoft Windows Coredump files.
- [Kvm](https://github.com/memflow/memflow-kvm) - KVM memflow connector.
- [Pcileech](https://github.com/memflow/memflow-pcileech) - Access pcileech interface.
- [Coredump](https://github.com/memflow/memflow-coredump) - Access Microsoft Windows Coredump files
- [Qemu_procfs](https://github.com/memflow/memflow-qemu-procfs) - Access QEMU Physical memory.
- [Unicorn](https://www.unicorn-engine.org/) - Unicorn is a lightweight multi-platform, multi-architecture CPU emulator framework.
- [MemProFS](https://github.com/ufrisk/MemProcFS) - MemProcFS is an easy and convenient way of viewing physical memory as files in a virtual file system.
- [MemProcFS](https://github.com/ufrisk/MemProcFS-plugins) - This repository contains various non-core plugins for MemProcFS - The Memory Process File System.
- [Microlibvmi](https://github.com/Wenzel/libmicrovmi) - A cross-platform unified Virtual Machine Introspection API library.
- [Radare2](https://github.com/radareorg/radare2) - Libre Reversing Framework for Unix Geeks
- [Radare2](https://github.com/radareorg/radare2) - Libre Reversing Framework for Unix Geeks.
- [Volatility3](https://github.com/volatilityfoundation/volatility3) - Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples.
## Xen Exploitation
@ -339,9 +339,9 @@ Contributions *very welcome* but first see [Contributing](#contributing).
## Qubes OS Legends
- [Joanna Rutkowska](https://en.wikipedia.org/wiki/Joanna_Rutkowska) - Founder of Qubes OS.
-[Blog](https://blog.invisiblethings.org/) - Personal Blog
- [Ninavizz](https://vimeo.com/user1589693) - Qubes OS UX Designer.
- [Blog](https://blog.invisiblethings.org/) - Personal Blog.
- [Marek Marczykowski-Górecki](https://github.com/marmarek) - Lead developer at Qubes OS.
- [Ninavizz](https://vimeo.com/user1589693) - Qubes OS UX Designer.
- [Unman](https://github.com/unman?tab=repositories)
- [templates](https://qubes.3isec.org/Templates_4.1/)
- [Core Team](https://www.qubes-os.org/team/#core-team)
@ -349,15 +349,15 @@ Contributions *very welcome* but first see [Contributing](#contributing).
## Training and Materials
- [Training-materials](https://github.com/QubesOS/training-materials/) - A Collection of training materials for Qubes OS
- [TGubes-diagrams](https://github.com/rootkovska/qubes-diagrams) - Qubes OS architecture diagrams
- [Tubes-artwork](https://github.com/QubesOS/qubes-artwork) - This repository contains various artworks for Qubes OS
- [Training-materials](https://github.com/QubesOS/training-materials/) - A Collection of training materials for Qubes OS.
- [TGubes-diagrams](https://github.com/rootkovska/qubes-diagrams) - Qubes OS architecture diagrams.
- [Tubes-artwork](https://github.com/QubesOS/qubes-artwork) - This repository contains various artworks for Qubes OS.
- [pwn.college](https://pwn.college/) - pwn.college is an education platform for students (and other interested parties) to learn about, and practice, core cybersecurity concepts in a hands-on fashion.
- [xn0px90](https://patreon.com/xn0px90) - Qubes training every second and fourth weekends of every month, from Friday to Monday, covering beginner, intermediate, and advanced levels.
## Streamers
- [infosecstreams](https://infosecstreams.com/) - An actively maintained activity-based-autosorted list of InfoSec Streamers.
- [infosecstreams](https://infosecstreams.com/) - An actively maintained activity-based-autosorted list of InfoSec Streamers
- [xn0px90](https://twitch.tv/xn0px90) - Your's::Trully!::First::Full::Time::Info::Sec::Qubes::OS::Streamer!
## Companies using Qubes OS