mirror of
https://github.com/xn0px90/awesome-qubes-os.git
synced 2024-10-01 06:35:43 -04:00
A curated list of awesome qubes os links
Sharp-tailed Grouse
01168f98e1
- Add .onion - Add PSA [matrix] space Signed-off-by: Sharp-tailed Grouse <no@anonymousplanet.org> |
||
---|---|---|
.github | ||
CONTRIBUTING.md | ||
LICENSE | ||
README.md |
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&G?~^^~?G&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#5!^::^^^^::^!YB@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#P7^:::^^^^^^^^^^:::^75#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&G?~:::^^^^^^^^^^^^^^^^^^:::~?P&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&BJ!^::^^^^^^^^^^^^::^^^^^^^^^^^^::^~JG&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@#5!^:::^^^^^^^^^^^:::~77~^::^^^^^^^^^^^^::^!Y#@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@J^::^^^^^^^^^^^:::^7P#@@@@&P?~:::^^^^^^^^^^:::^Y@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!7!!~^^^^^^^::^!Y#@@@@@@@@@@@@#57^::^^^^^^~!?Y5YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777!~~^:~JB&@@@@@@@@@@@@@@@@@@&BY~^^!?J55555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!Y@@@@@@@@@@@@@@@@@@@@@@@@@@PY55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!G@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!?#@@@@@@@@@@@@@@@@@@@@@@@@&P555555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!777777777!!7YB&@@@@@@@@@@@@@@@@@#GP55555555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@#!!7777777777!!!!?5#&@@@@@@@@@&BP5YY555555555555Y#@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@#J!!!!7777777777!!!7JP#&@&BP5YY5555555555555Y5P#@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@&BY?!!!77777777777!!!7Y5Y5555555555555555G#&@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&GJ7!!!77777777777Y55555555555555555P#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#PJ7!!!7777777Y555555555555555555Y5PG#@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&B5?!!!!777Y5555Y55YY555555555555YY5&@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&BY?!!!Y555G#&@#GP555555555555P#@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#GPB#&@@@@@@@@&BP55555PG#&@@@@@@@@@@@@@@@@@@@@@@@@@@@
_ ___ __ ___ ___
/_\__ __ _____ ___ ___ _ __ ___ / \ _ _| |__ ___ ___ / _ \/ __|
/ _ \ V V / -_|_-</ _ \ ' \/ -_) | (_) | || | '_ \/ -_|_-< | (_) \__ \
/_/ \_\_/\_/\___/__/\___/_|_|_\___| \__\_\\_,_|_.__/\___/__/ \___/|___/
Awesome Qubes OS
A curated list of Awesome Qubes OS links
A security-focused desktop operating system that aims to provide security through isolation.
This list is a collection of tools, projects, images, and resources conforming to the Awesome Manifesto.
Contributions very welcome but first see Contributing.
Table of Contents
- Qubes OS Websites
- System Requirements
- Downloading, Installing, Upgrading, and Building
- How-to guides
- Templates
- Qubes OS Server
- GPU
- Desktop Customization
- VPN
- Darknet
- Crypto
- Videos
- Security
- Kernels
- Unikernels
- Unikernel-like
- Exploitation Tools
- Xen Exploitation
- VM-Hardening
- System
- Services
- Advanced Topics
- Qubes OS Legends
- Training and Materials
- Companies using Qubes OS
- Social media
- Contributing
- Releases
- Adventure Further
- License
Qubes OS Websites
- Qubes OS - Qubes OS is an operating system built out of securely-isolated compartments called Qubes.
- Qubes OS Development Documentation - Qubes OS development documentation.
- Qubes OS Documentation - Qubes OS main documentation.
- Qubes OS GitHub Documentation - Qubes OS GitHub latest documentation.
- Qubes OS News - Latest Qubes OS News.
- Qubes OS Onion - Qubes OS onion address on the Tor network.
System Requirements
- Certified Hardware
- Community-recommended hardware
- Hardware compatibility list (HCL)
- System Requirements
Downloading, Installing, Upgrading, and Building
- Building - This is the second generation of the Qubes OS builder.
- Installing - Qubes OS installation guide!
- Qubes OS 4.1.1 - Qubes OS 4.1.1 download.
- Qubes OS 4.1.2 Weekly Builds - Qubes OS 4.1.2 Weekly Build download.
- Upgrading - These guides are for upgrading from one version of Qubes to another.
How-to guides
- How to back up, restore, and migrate
- How to copy and move files
- How to copy and paste text
- How to copy from dom0
- How to enter fullscreen mode
- How to install software
- How to update
- How to use PCI devices
- How to use USB devices
- How to use block storage devices
- How to use devices
- How to use disposables
- How to use optical discs
Templates
- Creating a NetBSD VM
- Customizing Fedora minimal templates
- Customizing Windows 7 templates
- Debian templates
- Fedora templates
- Minimal templates
- Pentesting: BlackArch
- Pentesting: Kali
- Pentesting: PTF
- Pentesting: Parrot
- Template: CentOS
- Template: Gentoo
- Template: Ubuntu
- Template: Whonix
- Template: Windows
- Templates
- Tips for Using Linux in an HVM
- Xfce templates
Qubes OS Server
- Ansible - Automation with Ansible.
- Qubes-network-server - Turn your Qubes OS into a networking server.
- Qubes-remote-desktop - SystemD services for creating VNC server session in dom0 or any qube.
GPU
- GUI-configuration
- GUI-domain
- GUI-troubleshooting
- GUI-virtualization
- How-to-use-pci-devices
- Install-nvidia-driver
- Nvidia-troubleshooting
- Windows-gaming-hvm
Desktop Customization
- AwesomeWM (window manager)
- Brightness-Ajustment
- Custom icons
- i3 (window manager)
- KDE (desktop environment)
- Suckless dwm - How to install dwm in Qubes OS.
VPN
- How To make a VPN Gateway in Qubes - Qubes includes a number of tools that can make the client-side setup of your VPN more versatile and secure.
- Qubes-Tunnel - Manage, run, protect VPN connections in Proxy VMs.
- Mullvad VPN - Privacy first VPN provider in Qubes OS.
- WireGuard - WireGuard: fast, modern, secure VPN tunnel.
Darknet
- i2p-whonix - Temporary way to run i2p on qubes-whonix.
- ipfs - A peer-to-peer hypermedia protocol to make the web faster, safer, and more open.
- Lokinet - Lokinet is the reference implementation of LLARP (low latency anonymous routing protocol), a layer 3 onion routing protocol.
- Whonix - Qubes-Whonix ™ is the seamless combination of Qubes OS and Whonix™ for advanced security and anonymity.
Crypto
- Split Bitcoin Wallet - A "split" bitcoin wallet is a strategy of protecting your bitcoin by having your wallet split into an offline "cold storage" wallet and an online "watching only" wallet.
- Awesome-DeSci - A curated list of awesome Decentralized Science (DeSci) resources, projects, articles and more.
Videos
- 3mdeb
- Explaining Computers presents “Qubes OS: Security Oriented Operating System”
- GPU Virtual Machine (GVM) - An OpenMdev Project (Qubes OS Summit 2022)
- GPU Virtual Machine (GVM) - An OpenMdev Project (Qubes OS Summit 2022)
- Qubes OS summit 2022: Day 1
- Qubes OS summit 2022: Day 2
- Qubes OS-3mdeb mini-summit 2021: Day 1
- Qubes OS-3mdeb mini-summit 2021: Day 2
- Micah Lee presents “Qubes OS: The Operating System That Can Protect You Even If You Get Hacked”
- UX Bessie - Qubes OS AppMenu Design Direction. Part of 2020/21 MOSS funded UX work.
- UX Jackie - Qubes OS AppMenu Design Direction. Part of 2020/21 MOSS funded UX work.
Security
- Anonymizing your MAC Address
- Anti evil maid (AEM)
- Data leaks
- Device handling security
- Firewall
- Passwordless root access in Qubes
- Reducing the fingerprint of the text-based web browser w3m
- Running Tails in Qubes
- Signal
- Split GPG
- Split SSH
- Split dm-crypt
- U2F proxy
- Using Multi-Factor Authentication with Qubes
- Using OnlyKey with Qubes OS
- Whonix for Privacy & Anonymity
- YubiKey
Vitualization
- Awesome-Virtualization - A curated list of awesome resources about virtualization.
Kernels
- eBPF - eBPF is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in an operating system kernel.
- OpenXT - OpenXT is an open-source development toolkit for hardware-assisted security research and appliance integration.
- Qubes-linux-kernel - Qubes package for Linux kernel.
- seL4 - seL4 is a high-assurance, high-performance operating system microkernel.
Unikernels
- Awesome-Unikernels - Secure, lightweight and high performance approach to application delivery.
- ClickOS - Efficient network function virtualization platform, optimized for Xen and developed by NEC.
- Clive - Research project from Rey Juan Carlos University (Madrid), developed in Go.
- HaLVM - Port of Glasgow Haskell compiler producing Xen optimized unikernels.
- Mini-OS - Reference kernel distributed with Xen.
- Qubes-Mirage-Firewall - A unikernel that can run as a Qubes OS ProxyVM, replacing sys-firewall.
Unikernel-like
- Drawbridge - Research prototype platform from Microsoft.
- Graphene - Library OS optimized for Intel SGX.
Exploitation Tools
- American Fuzzy Lop - Fuzzing is one of the most powerful and proven strategies for identifying security issues in real-world software
- Awesome-Fuzzing - A curated list of references to awesome Fuzzing for security testing. Additionally there is a collection of freely available academic papers, tools and so on.
- Bonzai - It's like a modular, multicall BusyBox builder for Go with built in completion and embedded documentation support.
- CodeQL - Discover vulnerabilities across a codebase with CodeQL.
- Joern - Joern is a platform for analyzing source code, bytecode, and binary executables. It generates code property graphs (CPGs), a graph representation of code for cross-language code analysis.
- LeechCore - The LeechCore Memory Acquisition Library focuses on Physical Memory Acquisition using various hardware and software based methods.
- LeechCore-Plugins - This repository contains various plugins for LeechCore - Physical Memory Acquisition Library.
- Libvmi - LibVMI is a C library with Python bindings that makes it easy to monitor the low-level details of a running virtual machine.
- Memflow - memflow is a library that enables introspection of various machines (hardware, virtual machines, memory dumps) in a generic fashion.
- Capstone - Capstone is a lightweight multi-platform, multi-architecture disassembly framework.
- Coredump - Access Microsoft Windows Coredump files.
- Kvm - KVM memflow connector.
- Pcileech - Access pcileech interface.
- Qemu_procfs - Access QEMU Physical memory.
- Unicorn - Unicorn is a lightweight multi-platform, multi-architecture CPU emulator framework.
- MemProFS - MemProcFS is an easy and convenient way of viewing physical memory as files in a virtual file system.
- MemProcFS - This repository contains various non-core plugins for MemProcFS - The Memory Process File System.
- Microlibvmi - A cross-platform unified Virtual Machine Introspection API library.
- Radare2 - Libre Reversing Framework for Unix Geeks.
- Volatility3 - Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples.
Xen Exploitation
Video Presentations
- Advanced Exploitation: Xen Hypervisor VM Escape
- Attacking Hypervisors Using Firmware And Hardware - [PDF Slides]
- Blackhat 2010 - Hacking the Hypervisor
- Lessons Learned from Eight Years of Breaking Hypervisors - [Website Slides]
- Ouroboros: Tearing Xen Hypervisor With the Snake
- Software Attacks on Hypervisor Emulation of Hardware - [PDF Slides]
- The Arms Race Over Virtualization - [PDF Slides]
- XenPwn: Breaking Paravirtualized Devices - [PDF Slide]
PDF Papers
- Bluepilling the Xen Hypervisor [PDF]
- Hypervisor Vulnerability Research - State of the Art [PDF]
- Preventing and Detecting Xen Hypervisor Subversions [PDF]
- Subverting the Xen Hypervisor [PDF]
Web articles
- Glitches in the Matrix – Escape via NMI
- Xen exploitation part 1: XSA-105, from nobody to root
- Xen exploitation part 2: XSA-148, from guest to host
VM-Hardening
System
- Architecture
- Audio virtualization
- Networking
- Qubes core admin client
- Qubes core admin
- Qubes core stack
- Security design goals
- Security-critical code
- Storage pools
- Template implementation
- Template manager
Services
- Admin API
- Dom0 secure updates
- Inter-qube file copying (qfilecopy)
- Qrexec: Qubes RPC internals
- Qrexec: secure communication across domains
- Qrexec: socket-based services
- Qubes memory manager (qmemman)
Advanced Topics
- Config files
- Disposable customization
- How to install software in dom0
- How to make any file persistent (bind-dirs)
- How to mount a Qubes partition from another OS
- Installing contributed packages
- Managing qube kernels
- Qubes service
- RPC policies
- Resize disk image
- Salt (management software)
- Secondary storage
- Standalones and HVMs
- USB qubes
- Volume backup and revert
- Windows qubes
Qubes OS Legends
- Joanna Rutkowska - Founder of Qubes OS.
- Blog - Personal Blog.
- Marek Marczykowski-Górecki - Lead developer at Qubes OS.
- Ninavizz - Qubes OS UX Designer.
- Unman
- You can be one too! You've got this! Keep Qubing!
Training and Materials
- Training-materials - A Collection of training materials for Qubes OS.
- Qubes-diagrams - Qubes OS architecture diagrams.
- Qubes-artwork - This repository contains various artworks for Qubes OS.
- pwn.college - pwn.college is an education platform for students (and other interested parties) to learn about, and practice, core cybersecurity concepts in a hands-on fashion.
- Anonymous Planet - The Hitchhiker’s Guide to Online Anonymity: the comprehensive guide for online anonymity and OpSec.
- Anonymous Planet Onion - For those who wish to read over the anonymous Tor network.
- Privacy-Security-Anonymity Matrix Space - The place to be for all topics regarding privacy, anonymity and other subjects. Rooms are click-to-join.
- xn0px90 - Qubes training every second and fourth weekends of every month, from Friday to Monday, covering beginner, intermediate, and advanced levels.
Streamers
- infosecstreams - An actively maintained activity-based-autosorted list of InfoSec Streamers
- xn0px90 - Your's::Trully!::First::Full::Time::Info::Sec::Qubes::OS::Streamer!
Companies using Qubes OS
- Qubes Partners - The Qubes Project relies greatly on the generous support of the organizations, companies, and individuals who have become Qubes Partners.
Social media
The Qubes OS Project has a presence on the following social media platforms:
- ClubHouse
- Discord
- Forum
- Mastodon
- Matrix Discord Bridge
- Matrix:Qubes OS
- Reddit Qubes OS
- Reddit hacking_qubes_os
- Reddit hack_with_qubes_os
#xen
channel on irc.oftc.net via traditional IRC clients.#qubes
channel on irc.libera.chat via traditional IRC clients.#qubes-os
channel on irc.anonops.com via traditional IRC clients.
Contributing
Contribution guidelines can be found here.
Releases
Adventure Further
- Adventures start here ---> Adventure Here! - All the awesome list. ⬆ back to top
License
This work is licensed under a Creative Commons Attribution 1.0 Generic.
:|: ADVENTURE FURTHER :|: HACK ALL THE THINGS :|: TRUST NOTHING :|: WITH <3! ~X