mirror of
https://github.com/xn0px90/awesome-qubes-os.git
synced 2025-02-22 15:59:52 -05:00
Merge pull request #5 from projectdp/main
Fixes to README.md and CONTRIBUTING.md
This commit is contained in:
commit
ff11e1333c
@ -1,6 +1,6 @@
|
||||
# Contribution Guidelines
|
||||
|
||||
> The pull request should have a useful title. Pull requests with `Update readme.md` as title will be closed right away. Please make sure you checked every box in the PR template.
|
||||
> The pull request should have a useful title. Pull requests with `Update README.md` as title will be closed right away. Please make sure you checked every box in the PR template.
|
||||
|
||||
## Before adding something to the list
|
||||
|
||||
@ -8,16 +8,16 @@
|
||||
2. Add your item to the category it belongs to. Try to avoid creating completely new categories.
|
||||
3. Make sure your item is added in the correct alphabetical order for its section.
|
||||
4. Don't submit dead links and try to always submit HTTPS links.
|
||||
5. Make sure you're linking to an English resource, other languages not allowed *at this moment*
|
||||
5. Make sure you're linking to an English resource, other languages not allowed *at this moment*.
|
||||
|
||||
### Adding an item to the list
|
||||
|
||||
1. Click README.md
|
||||
2. Click the *pencil button* in the upper right corner next to raw | blame | history
|
||||
1. Click README.md.
|
||||
2. Click the *pencil button* in the upper right corner next to raw | blame | history.
|
||||
3. Github will automatically create a fork for this repo on your account.
|
||||
4. Put your edit in.
|
||||
5. At the bottom of the page fill in a meaningful commit summary and click *Propose file change*.
|
||||
6. You'll be taken to the PR screen, click the *Create Pull Request* button
|
||||
7. Make sure you check the boxes (and actually make sure they're right) and click *Create Pull Request*
|
||||
6. You'll be taken to the PR screen, click the *Create Pull Request* button.
|
||||
7. Make sure you check the boxes (and actually make sure they're right) and click *Create Pull Request*.
|
||||
|
||||
Submitted PRs will be checked as soon as possible.
|
||||
|
30
README.md
30
README.md
@ -75,10 +75,10 @@ Contributions *very welcome* but first see [Contributing](#contributing).
|
||||
|
||||
## Qubes OS Websites
|
||||
|
||||
- [Qubes OS](https://www.qubes-os.org) - Qubes OS is an operating system built out of securely-isolated compartments called qubes.
|
||||
- [Qubes OS](https://www.qubes-os.org) - Qubes OS is an operating system built out of securely-isolated compartments called Qubes.
|
||||
- [Qubes OS Development Documentation](https://dev.qubes-os.org/en/latest/) - Qubes OS development documentation.
|
||||
- [Qubes OS Documentation](https://www.qubes-os.org/doc/) - Qubes OS main documentation.
|
||||
- [Qubes OS Github Documentation](https://github.com/QubesOS/qubes-doc) - Qubes OS github latest documentation.
|
||||
- [Qubes OS GitHub Documentation](https://github.com/QubesOS/qubes-doc) - Qubes OS GitHub latest documentation.
|
||||
- [Qubes OS News](https://www.qubes-os.org/news/) - Latest Qubes OS News.
|
||||
- [Qubes OS Onion](http://www.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion) - Qubes OS onion address on the Tor network.
|
||||
|
||||
@ -219,9 +219,9 @@ Contributions *very welcome* but first see [Contributing](#contributing).
|
||||
|
||||
## Kernels
|
||||
|
||||
- [Qubes-linux-kernel](https://github.com/QubesOS/qubes-linux-kernel) - Qubes package for Linux kernel
|
||||
- [eBPF](https://ebpf.io) - eBPF is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in an operating system kernel.
|
||||
- [OpenXT](https://openxt.org/) - OpenXT is an open-source development toolkit for hardware-assisted security research and appliance integration.
|
||||
- [Qubes-linux-kernel](https://github.com/QubesOS/qubes-linux-kernel) - Qubes package for Linux kernel.
|
||||
- [seL4](https://sel4.systems/) - seL4 is a high-assurance, high-performance operating system microkernel.
|
||||
|
||||
## Unikernels
|
||||
@ -243,22 +243,22 @@ Contributions *very welcome* but first see [Contributing](#contributing).
|
||||
- [American Fuzzy Lop](https://github.com/google/AFL) - Fuzzing is one of the most powerful and proven strategies for identifying security issues in real-world software
|
||||
- [Awesome-Fuzzing](https://github.com/cpuu/awesome-fuzzing) - A curated list of references to awesome Fuzzing for security testing. Additionally there is a collection of freely available academic papers, tools and so on.
|
||||
- [Bonzai](https://github.com/rwxrob/bonzai) - It's like a modular, multicall BusyBox builder for Go with built in completion and embedded documentation support.
|
||||
- [CodeQL](https://codeql.github.com/) - Discover vulnerabilities across a codebase with CodeQL
|
||||
- [Joern](https://github.com/joernio/joern) - Joern is a platform for analyzing source code, bytecode, and binary executables. It generates code property graphs (CPGs), a graph representation of code for cross-language code analysis
|
||||
- [CodeQL](https://codeql.github.com/) - Discover vulnerabilities across a codebase with CodeQL.
|
||||
- [Joern](https://github.com/joernio/joern) - Joern is a platform for analyzing source code, bytecode, and binary executables. It generates code property graphs (CPGs), a graph representation of code for cross-language code analysis.
|
||||
- [LeechCore](https://github.com/ufrisk/LeechCore) - The LeechCore Memory Acquisition Library focuses on Physical Memory Acquisition using various hardware and software based methods.
|
||||
- [LeechCore-Plugins](https://github.com/ufrisk/LeechCore-plugins) - This repository contains various plugins for LeechCore - Physical Memory Acquisition Library.
|
||||
- [Libvmi](https://libvmi.com/) - LibVMI is a C library with Python bindings that makes it easy to monitor the low-level details of a running virtual machine.
|
||||
- [Memflow](https://github.com/memflow/memflow) - memflow is a library that enables introspection of various machines (hardware, virtual machines, memory dumps) in a generic fashion.
|
||||
- [Unicorn](https://www.unicorn-engine.org/) - Unicorn is a lightweight multi-platform, multi-architecture CPU emulator framework.
|
||||
- [Capstone](https://www.capstone-engine.org/) - Capstone is a lightweight multi-platform, multi-architecture disassembly framework.
|
||||
- [Qemu_procfs](https://github.com/memflow/memflow-qemu-procfs) - Access QEMU Physical memory.
|
||||
- [Coredump](https://github.com/memflow/memflow-coredump) - Access Microsoft Windows Coredump files.
|
||||
- [Kvm](https://github.com/memflow/memflow-kvm) - KVM memflow connector.
|
||||
- [Pcileech](https://github.com/memflow/memflow-pcileech) - Access pcileech interface.
|
||||
- [Coredump](https://github.com/memflow/memflow-coredump) - Access Microsoft Windows Coredump files
|
||||
- [Qemu_procfs](https://github.com/memflow/memflow-qemu-procfs) - Access QEMU Physical memory.
|
||||
- [Unicorn](https://www.unicorn-engine.org/) - Unicorn is a lightweight multi-platform, multi-architecture CPU emulator framework.
|
||||
- [MemProFS](https://github.com/ufrisk/MemProcFS) - MemProcFS is an easy and convenient way of viewing physical memory as files in a virtual file system.
|
||||
- [MemProcFS](https://github.com/ufrisk/MemProcFS-plugins) - This repository contains various non-core plugins for MemProcFS - The Memory Process File System.
|
||||
- [Microlibvmi](https://github.com/Wenzel/libmicrovmi) - A cross-platform unified Virtual Machine Introspection API library.
|
||||
- [Radare2](https://github.com/radareorg/radare2) - Libre Reversing Framework for Unix Geeks
|
||||
- [Radare2](https://github.com/radareorg/radare2) - Libre Reversing Framework for Unix Geeks.
|
||||
- [Volatility3](https://github.com/volatilityfoundation/volatility3) - Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples.
|
||||
|
||||
## Xen Exploitation
|
||||
@ -339,9 +339,9 @@ Contributions *very welcome* but first see [Contributing](#contributing).
|
||||
## Qubes OS Legends
|
||||
|
||||
- [Joanna Rutkowska](https://en.wikipedia.org/wiki/Joanna_Rutkowska) - Founder of Qubes OS.
|
||||
-[Blog](https://blog.invisiblethings.org/) - Personal Blog
|
||||
- [Ninavizz](https://vimeo.com/user1589693) - Qubes OS UX Designer.
|
||||
- [Blog](https://blog.invisiblethings.org/) - Personal Blog.
|
||||
- [Marek Marczykowski-Górecki](https://github.com/marmarek) - Lead developer at Qubes OS.
|
||||
- [Ninavizz](https://vimeo.com/user1589693) - Qubes OS UX Designer.
|
||||
- [Unman](https://github.com/unman?tab=repositories)
|
||||
- [templates](https://qubes.3isec.org/Templates_4.1/)
|
||||
- [Core Team](https://www.qubes-os.org/team/#core-team)
|
||||
@ -349,15 +349,15 @@ Contributions *very welcome* but first see [Contributing](#contributing).
|
||||
|
||||
## Training and Materials
|
||||
|
||||
- [Training-materials](https://github.com/QubesOS/training-materials/) - A Collection of training materials for Qubes OS
|
||||
- [TGubes-diagrams](https://github.com/rootkovska/qubes-diagrams) - Qubes OS architecture diagrams
|
||||
- [Tubes-artwork](https://github.com/QubesOS/qubes-artwork) - This repository contains various artworks for Qubes OS
|
||||
- [Training-materials](https://github.com/QubesOS/training-materials/) - A Collection of training materials for Qubes OS.
|
||||
- [TGubes-diagrams](https://github.com/rootkovska/qubes-diagrams) - Qubes OS architecture diagrams.
|
||||
- [Tubes-artwork](https://github.com/QubesOS/qubes-artwork) - This repository contains various artworks for Qubes OS.
|
||||
- [pwn.college](https://pwn.college/) - pwn.college is an education platform for students (and other interested parties) to learn about, and practice, core cybersecurity concepts in a hands-on fashion.
|
||||
- [xn0px90](https://patreon.com/xn0px90) - Qubes training every second and fourth weekends of every month, from Friday to Monday, covering beginner, intermediate, and advanced levels.
|
||||
|
||||
## Streamers
|
||||
|
||||
- [infosecstreams](https://infosecstreams.com/) - An actively maintained activity-based-autosorted list of InfoSec Streamers.
|
||||
- [infosecstreams](https://infosecstreams.com/) - An actively maintained activity-based-autosorted list of InfoSec Streamers
|
||||
- [xn0px90](https://twitch.tv/xn0px90) - Your's::Trully!::First::Full::Time::Info::Sec::Qubes::OS::Streamer!
|
||||
|
||||
## Companies using Qubes OS
|
||||
|
Loading…
x
Reference in New Issue
Block a user