awesome-qubes-os/README.md
2023-01-07 18:56:46 -07:00

364 lines
25 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Avesome Qubes OS [![Track Awesome List](https://www.trackawesomelist.com/badge.svg)](https://www.trackawesomelist.com/xn0px90/Awesome-Qubes-OS/)[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&G?~^^~?G&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#5!^::^^^^::^!YB@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#P7^:::^^^^^^^^^^:::^75#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&G?~:::^^^^^^^^^^^^^^^^^^:::~?P&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&BJ!^::^^^^^^^^^^^^::^^^^^^^^^^^^::^~JG&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@#5!^:::^^^^^^^^^^^:::~77~^::^^^^^^^^^^^^::^!Y#@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@J^::^^^^^^^^^^^:::^7P#@@@@&P?~:::^^^^^^^^^^:::^Y@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!7!!~^^^^^^^::^!Y#@@@@@@@@@@@@#57^::^^^^^^~!?Y5YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777!~~^:~JB&@@@@@@@@@@@@@@@@@@&BY~^^!?J55555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!Y@@@@@@@@@@@@@@@@@@@@@@@@@@PY55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!G@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!?#@@@@@@@@@@@@@@@@@@@@@@@@&P555555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!777777777!!7YB&@@@@@@@@@@@@@@@@@#GP55555555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@#!!7777777777!!!!?5#&@@@@@@@@@&BP5YY555555555555Y#@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@#J!!!!7777777777!!!7JP#&@&BP5YY5555555555555Y5P#@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@&BY?!!!77777777777!!!7Y5Y5555555555555555G#&@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&GJ7!!!77777777777Y55555555555555555P#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#PJ7!!!7777777Y555555555555555555Y5PG#@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&B5?!!!!777Y5555Y55YY555555555555YY5&@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&BY?!!!Y555G#&@#GP555555555555P#@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#GPB#&@@@@@@@@&BP55555PG#&@@@@@@@@@@@@@@@@@@@@@@@@@@@
_ ___ __ ___ ___
/_\__ __ _____ ___ ___ _ __ ___ / \ _ _| |__ ___ ___ / _ \/ __|
/ _ \ V V / -_|_-</ _ \ ' \/ -_) | (_) | || | '_ \/ -_|_-< | (_) \__ \
/_/ \_\_/\_/\___/__/\___/_|_|_\___| \__\_\\_,_|_.__/\___/__/ \___/|___/
# A curated list of awesome Qubes OS links
## Table of Contents
- [Qubes OS Websites](#Qubes-OS-Websites)
- [System Requirements](#System-Requirements)
- [Downloading, Installing, Upgrading and Building](#Downloading,-Installing,-Upgrading-and-Building)
- [How-to guides](How-to-guides)
- [Templates](#Templates)
- [Networking Server](Networking-Server)
- [Automation](#Automation)
- [Video & Screen Sharing](#Video-&-Screen-Sharing)
- [Remote-Desktop](#Remote-Desktop)
- [VPN](#VPN)
- [Darknet](#Darknet)
- [Crypto](#Crypto)
- [Videos](#Videos)
- [Security](#Security)
- [Kernels](#Kernels)
- [Unikernels](#Unikernels)
- [Unikernel-like](#Unikernel-like)
- [Exploitation Tools](#Exploitation-Tools)
- [Xen Exploitation](#Xen-Exploitation)
- [VM-Hardening](#VM-Hardening)
- [System](#System)
- [Services](#Services)
- [Advanced Topics](#Advanced-Topics)
- [Qubes OS Legends](#Qubes-OS-Legends)
- [Training](#Training)
- [Companies using Qubes OS](#Companies-using-Qubes-OS)
- [Social media](#Social-media)
- [Contributing](#Contributing)
- [Releases](#Releases)
- [Adventure Further](#Adventure-Further)
- [License](#License)
## Qubes OS Websites
- [Qubes OS](https://www.qubes-os.org) - Qubes OS is an operating system built out of securely-isolated compartments called qubes.
- [Qubes OS.onion](www.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion) - Qubes OS onion address.
- [Qubes OS docs](https://www.qubes-os.org/doc/) - Qubes OS main docs
- [Qubes OS github docs](https://github.com/QubesOS/qubes-doc) - Qubes OS github latest docs.
- [Qubes OS dev docs](https://dev.qubes-os.org/en/latest/) - Qubes OS dev Docs
- [Qubes OS News](https://www.qubes-os.org/news/) - Latest Qubes OS News
## System Requirements
- [System Requirements](https://www.qubes-os.org/doc/system-requirements/)
- [Certified Hardware](https://www.qubes-os.org/doc/certified-hardware/)
- [Community-recommended hardware](https://www.qubes-os.org/doc/community-recommended-hardware/)
- [Hardware compatibility list (HCL)](https://www.qubes-os.org/hcl/)
## Downloading, Installing, Upgrading and Building
- [Downloading](https://www.qubes-os.org/downloads/)
- [Qubes OS 4.1](https://www.qubes-os.org/downloads/) - Qubes OS 4.1 Download
- [Qubes OS 4.1 Weekly Builds](https://qubes.notset.fr/iso/) - Qubes OS 4.1 Weekly Build Download
- [Installing](https://www.qubes-os.org/doc/installation-guide/)
- [Upgrading](https://www.qubes-os.org/doc/upgrade/)
- [Building](https://github.com/QubesOS/qubes-builderv2)
## How-to guides
- [How to update](https://www.qubes-os.org/doc/how-to-update/)
- [How to back up, restore, and migrate](https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/)
- [How to copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/)
- [How to copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/)
- [How to copy from dom0](https://www.qubes-os.org/doc/how-to-copy-from-dom0/)
- [How to install software](https://www.qubes-os.org/doc/how-to-install-software/)
- [How to use disposables](https://www.qubes-os.org/doc/how-to-use-disposables/)
- [How to enter fullscreen mode](https://www.qubes-os.org/doc/how-to-enter-fullscreen-mode/)
- [How to use devices](https://www.qubes-os.org/doc/how-to-use-devices/)
- [How to use block storage devices](https://www.qubes-os.org/doc/how-to-use-block-storage-devices/)
- [How to use USB devices](https://www.qubes-os.org/doc/how-to-use-usb-devices/)
- [How to use PCI devices](https://www.qubes-os.org/doc/how-to-use-pci-devices/)
- [How to use optical discs](https://www.qubes-os.org/doc/how-to-use-optical-discs/)
## Templates
- [Templates](https://www.qubes-os.org/doc/templates/)
- [Template: Ubuntu](https://github.com/Qubes-Community/Contents/blob/master/docs/os/ubuntu.md)
- [Template: Windows](https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows-vm.md)
- [Customizing Windows 7 templates](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/windows-template-customization.md)
- [Template: Whonix](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/whonix.md)
- [Template: CentOS](https://github.com/Qubes-Community/Contents/blob/master/docs/os/centos.md)
- [Template: Gentoo](https://github.com/Qubes-Community/Contents/blob/master/docs/os/gentoo.md)
- [Pentesting: BlackArch](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/blackarch.md)
- [Pentesting: Kali](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/kali.md)
- [Pentesting: Parrot](https://www.parrotsec.org/docs/parrot-on-qubesos.html)
- [Pentesting: PTF](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/ptf.md)
- [Fedora templates](https://www.qubes-os.org/doc/templates/fedora/)
- [Debian templates](https://www.qubes-os.org/doc/templates/debian/)
- [Minimal templates](https://www.qubes-os.org/doc/templates/minimal/)
- [Customizing Fedora minimal templates](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/fedora-minimal-template-customization.md)
- [Xfce templates](https://www.qubes-os.org/doc/templates/xfce/)
- [Tips for Using Linux in an HVM](https://github.com/Qubes-Community/Contents/blob/master/docs/os/linux-hvm-tips.md)
- [Creating a NetBSD VM](https://github.com/Qubes-Community/Contents/blob/master/docs/os/netbsd.md)
## Networking Server
- [qubes-network-server](https://github.com/Rudd-O/qubes-network-server) - Turn your Qubes OS into a networking server
## Automation
- [Ansible](https://qubes-ansible.readthedocs.io/en/latest/) - Automation with Ansible
## Video & Screen Sharing
- [qubes-video-companion](https://github.com/elliotkillick/qubes-video-companion) - Qubes Video Companion is a tool for securely streaming webcams and sharing screens across virtual machines.
## Custom Desktop
- [brightness-ajustment](https://forum.qubes-os.org/t/easy-brightness-adjustment/15902/2)
- [custom icons](https://forum.qubes-os.org/t/where-is-the-most-optimal-place-to-put-custom-folder-icons/15740/3)
- [suckless dwm](https://github.com/3o14r473/GUIDE_how-to-install-dwm-in-qubesos) - How to install dwm in qubesos
## Remote-Desktop
- [qubes-remote-desktop](https://github.com/QubesOS-contrib/qubes-remote-desktop) - SystemD services for creating VNC server session in dom0 or any qube.
## VPN
- [How To make a VPN Gateway in Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md) - Qubes includes a number of tools that can make the client-side setup of your VPN more versatile and secure.
- [Mullvad VPN](https://mullvad.net/en/help/qubes-os-4-and-mullvad-vpn/) - Privacy first VPN provider in Qubes OS.
- [qubes-tunnel](https://github.com/QubesOS-contrib/qubes-tunnel) - Manage, run, protect VPN connections in Proxy VMs.
- [WireGuard](https://github.com/Qubes-Community/Contents/tree/master/docs/wireguard) - WireGuard: fast, modern, secure VPN tunnel
## Darknet
- [Whonix](https://www.whonix.org/wiki/Qubes)
- [i2p-whonix](https://forum.qubes-os.org/t/temporary-way-to-run-i2p-on-qubes-whonix/15861)
- [Lokinet](https://github.com/oxen-io/lokinet) - Lokinet is the reference implementation of LLARP (low latency anonymous routing protocol), a layer 3 onion routing protocol.
- [ipfs](https://github.com/ipfs/ipfs) - A peer-to-peer hypermedia protocol to make the web faster, safer, and more open.
## Crypto
- [awesome-desci](https://github.com/DeSciWorldDAO/awesome-desci) - A curated list of awesome Decentralized Science (DeSci) resources, projects, articles and more.
- [Split Bitcoin Wallet](https://github.com/Qubes-Community/Contents/blob/master/docs/security/split-bitcoin.md)
## Videos
- [3mdeb](https://3mdeb.com/)
- [Qubes OS summit 2022: Day 1](https://www.youtube.com/watch?v=hkWWz3xGqS8)
- [Qubes OS summit 2022: Day 2](https://www.youtube.com/watch?v=A9GrlQsQc7Q)
- [Qubes OS-3mdeb mini-summit 2021: Day 1](https://www.youtube.com/watch?v=y3V_V0Vllas)
- [Qubes OS-3mdeb mini-summit 2021: Day 2](https://www.youtube.com/watch?v=KdDr6TiqF0k)
- [GPU Virtual Machine (GVM) - An OpenMdev Project (Qubes OS Summit 2022)](https://www.youtube.com/watch?v=YllX-ud70Nk)
- [Micah Lee presents “Qubes OS: The Operating System That Can Protect You Even If You Get Hacked”](https://livestream.com/accounts/9197973/events/8286152/videos/178431606)
- [Explaining Computers presents “Qubes OS: Security Oriented Operating System”](https://www.youtube.com/watch?v=hWDvS_Mp6gc)
- [ninavizz](https://vimeo.com/user1589693) - Qubes OS UX Designer
- [UX Jackie](https://vimeo.com/541946756) - Qubes OS AppMenu Design Direction. Part of 2020/21 MOSS funded UX work.
- [UX Bessie](https://vimeo.com/542041258) - Qubes OS AppMenu Design Direction. Part of 2020/21 MOSS funded UX work.
- [GPU Virtual Machine (GVM) - An OpenMdev Project (Qubes OS Summit 2022)](https://www.youtube.com/watch?v=YllX-ud70Nk)
## Security
* [Firewall](https://www.qubes-os.org/doc/firewall/)
* [Data leaks](https://www.qubes-os.org/doc/data-leaks/)
* [Passwordless root access in qubes](https://www.qubes-os.org/doc/vm-sudo/)
* [Device handling security](https://www.qubes-os.org/doc/device-handling-security/)
* [Anti evil maid (AEM)](https://www.qubes-os.org/doc/anti-evil-maid/)
* [Split GPG](https://www.qubes-os.org/doc/split-gpg/)
* [U2F proxy](https://www.qubes-os.org/doc/u2f-proxy/)
* [YubiKey](https://www.qubes-os.org/doc/yubikey/)
* [Using Multi-Factor Authentication with Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/security/multifactor-authentication.md)
* [Split dm-crypt](https://github.com/rustybird/qubes-split-dm-crypt)
* [Split SSH](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/split-ssh.md)
* [Using OnlyKey with Qubes OS](https://docs.crp.to/qubes.html)
* [Whonix for Privacy & Anonymity](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/whonix.md)
* [Running Tails in Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/tails.md)
* [Anonymizing your MAC Address](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/anonymizing-your-mac-address.md)
* [Signal](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/signal.md)
* [Reducing the fingerprint of the text-based web browser w3m](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/w3m.md)
## Vitualization
- [awesome-virtualization](https://github.com/Wenzel/awesome-virtualization) - A curated list of awesome resources about virtualization.
## Kernels
- [eBPF](https://ebpf.io) - eBPF is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in an operating system kernel.
- [sel4](https://sel4.systems/) - seL4 is a high-assurance, high-performance operating system microkernel.
- [OpenXT](https://openxt.org/) - OpenXT is an open-source development toolkit for hardware-assisted security research and appliance integration
## Unikernels
- [Awesome-unikernels](https://github.com/uniqernel/awesome-unikernels) - Secure, lightweight and high performance approach to application delivery
- [ClickOS](http://cnp.neclab.eu/projects/clickos) - Efficient network function virtualization platform, optimized for Xen and developed by NEC.
- [Clive](http://lsub.org/ls/clive.html) - Research project from Rey Juan Carlos University (Madrid), developed in Go.
- [Mini-OS](https://wiki.xen.org/wiki/Mini-OS) - Reference kernel distributed with Xen.
- [HaLVM](https://galois.com/project/halvm) - Port of Glasgow Haskell compiler producing Xen optimized unikernels.
## Unikernel-like
- [Drawbridge](https://www.microsoft.com/en-us/research/project/drawbridge) - Research prototype platform from Microsoft.
- [Graphene](https://github.com/oscarlab/graphene) - Library OS optimized for Intel SGX.
## Exploitation Tools
- [libvmi](https://libvmi.com/) - LibVMI is a C library with Python bindings that makes it easy to monitor the low-level details of a running virtual machine
- [microlibvmi](https://github.com/Wenzel/libmicrovmi) - A cross-platform unified Virtual Machine Introspection API library
- [awesome-virtualization](https://github.com/Wenzel/awesome-virtualization) - A curated list of awesome resources about virtualization.
- [radare2](https://github.com/radareorg/radare2) - Libre Reversing Framework for Unix Geeks
- [American Fuzzy Lop](https://github.com/google/AFL) - Fuzzing is one of the most powerful and proven strategies for identifying security issues in real-world software
- [Bonzai](https://github.com/rwxrob/bonzai) - It's like a modular, multicall BusyBox builder for Go with built in completion and embedded documentation support.
- [codeQL](https://codeql.github.com/) - Discover vulnerabilities across a codebase with CodeQL
- [joern](https://github.com/joernio/joern) - Joern is a platform for analyzing source code, bytecode, and binary executables. It generates code property graphs (CPGs), a graph representation of code for cross-language code analysis
- [awesome-fuzzing](https://github.com/cpuu/awesome-fuzzing) -
- [Volatility3](https://github.com/volatilityfoundation/volatility3) - Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples.
- [MemProFS](https://github.com/ufrisk/MemProcFS) - MemProcFS is an easy and convenient way of viewing physical memory as files in a virtual file system.
- [MemProcFS](https://github.com/ufrisk/MemProcFS-plugins) - This repository contains various non-core plugins for MemProcFS - The Memory Process File System.
- [LeechCore](https://github.com/ufrisk/LeechCore) - The LeechCore Memory Acquisition Library focuses on Physical Memory Acquisition using various hardware and software based methods.
- [LeechCore-pluins](https://github.com/ufrisk/LeechCore-plugins) - This repository contains various plugins for LeechCore - Physical Memory Acquisition Library.
- [memflow](https://github.com/memflow/memflow) - memflow is a library that enables introspection of various machines (hardware, virtual machines, memory dumps) in a generic fashion.
- [qemui_procfs](https://github.com/memflow/memflow-qemu-procfs) - access QEMU Physical memory
- [Kvm](https://github.com/memflow/memflow-kvm) - kvm memflow connector
- [pcileech](https://github.com/memflow/memflow-pcileech) - access pcileech interface
- [coredump](https://github.com/memflow/memflow-coredump) - access Microsoft Windows Coredump files
## Xen Exploitation
- [Ouroboros: Tearing Xen Hypervisor With the Snake](https://www.youtube.com/watch?v=kt3kX94kWcM)
- [Subverting the Xen hypervisor](https://invisiblethingslab.com/resources/bh08/part1.pdf)
- [Preventing and Detecting Xen Hypervisor Subversions](https://invisiblethingslab.com/resources/bh08/part2.pdf)
- [Bluepilling the Xen Hypervisor](https://invisiblethingslab.com/resources/bh08/part3.pdf)
- [XenPwn: Breaking paravirtualized devices](https://www.youtube.com/watch?v=qxz8MzE3QME) - [[Slide]](https://www.blackhat.com/docs/us-16/materials/us-16-Wilhelm-Xenpwn-Breaking-Paravirtualized-Devices-wp.pdf)
- [Advanced Exploitation: Xen Hypervisor VM Escape ](https://www.youtube.com/watch?v=6Ld5CiInrcI)
- [Xen exploitation part 1: XSA-105, from nobody to root](https://blog.quarkslab.com/xen-exploitation-part-1-xsa-105-from-nobody-to-root.html)
- [Xen exploitation part 2: XSA-148, from guest to host](https://blog.quarkslab.com/xen-exploitation-part-2-xsa-148-from-guest-to-host.html)
- [Blackhat 2010 - Hacking the Hypervisor](https://www.youtube.com/watch?v=sTC9x5hYYFo&t=3s)
- [Software Attacks on Hypervisor Emulation of Hardware](https://www.youtube.com/watch?v=c4DnlP88D2Y) - [[Slides]](https://www.troopers.de/downloads/troopers17/TR17_Attacking_hypervisor_through_hardwear_emulation.pdf)
- [Lessons Learned from Eight Years of Breaking Hypervisors](https://www.youtube.com/watch?v=PJWJjb0uxXE) - [[Slides]](https://www.blackhat.com/docs/eu-14/materials/eu-14-Wojtczuk-Lessons-Learned-From-Eight-Years-Of-Breaking-Hypervisors.pdf)
- [Attacking Hypervisors Using Firmware And Hardware](https://www.youtube.com/watch?v=nyW3eTobXAI) - [[Slides]](http://c7zero.info/stuff/AttackingHypervisorsViaFirmware_bhusa15_dc23.pdf)
- [The Arms Race Over Virtualization](https://www.youtube.com/watch?v=nWvg7NKwOjg) - [[Slides]](https://www.blackhat.com/docs/us-16/materials/us-16-Luan-Ouroboros-Tearing-Xen-Hypervisor-With-The-Snake.pdf)
- [Glitches in the Matrix Escape via NMI](https://www.cpl0.com/blog/?p=46)
- [Hypervisor Vulnerability Research - State of the Art](https://alisa.sh/slides/HypervisorVulnerabilityResearch2020.pdf)
## VM-Hardening
- [Qubes-VM-hardening](https://github.com/tasket/Qubes-VM-hardening)
- [Kicksecure](https://www.kicksecure.com/wiki/Kicksecure-Qubes_Security)
- [qcrypt](https://github.com/3hhh/qcrypt)
## System
- [Architecture](https://www.qubes-os.org/doc/architecture/)
- [Security design goals](https://www.qubes-os.org/doc/security-design-goals/)
- [Security-critical code](https://www.qubes-os.org/doc/security-critical-code/)
- [Qubes core admin](https://www.qubes-os.org/doc/qubes-core-admin/)
- [Qubes core admin client](https://www.qubes-os.org/doc/qubes-core-admin-client/)
- [Qubes core stack](https://www.qubes-os.org/doc/qubes-core-stack/)
- [GUI virtualization](https://www.qubes-os.org/doc/gui/)
- [Networking](https://www.qubes-os.org/doc/networking/)
- [Template implementation](https://www.qubes-os.org/doc/template-implementation/)
- [Storage pools](https://www.qubes-os.org/doc/storage-pools/)
- [Audio virtualization](https://www.qubes-os.org/doc/audio-virtualization/)
- [Template manager](https://www.qubes-os.org/doc/template-manager/)
## Services
- [Inter-qube file copying (qfilecopy)](https://www.qubes-os.org/doc/qfilecopy/)
- [Qubes memory manager (qmemman)](https://www.qubes-os.org/doc/qmemman/)
- [Dom0 secure updates](https://www.qubes-os.org/doc/dom0-secure-updates/)
- [Qrexec: secure communication across domains](https://www.qubes-os.org/doc/qrexec/)
- [Qrexec: Qubes RPC internals](https://www.qubes-os.org/doc/qrexec-internals/)
- [Qrexec: socket-based services](https://www.qubes-os.org/doc/qrexec-socket-services/)
- [Admin API](https://www.qubes-os.org/doc/admin-api/)
## Advanced Topics
- [How to install software in dom0](https://www.qubes-os.org/doc/how-to-install-software-in-dom0/)
- [Volume backup and revert](https://www.qubes-os.org/doc/volume-backup-revert/)
- [Standalones and HVMs](https://www.qubes-os.org/doc/standalones-and-hvms/)
- [Windows qubes](https://www.qubes-os.org/doc/windows/)
- [Config files](https://www.qubes-os.org/doc/config-files/)
- [Secondary storage](https://www.qubes-os.org/doc/secondary-storage/)
- [RPC policies](https://www.qubes-os.org/doc/rpc-policy/)
- [USB qubes](https://www.qubes-os.org/doc/usb-qubes/)
- [Managing qube kernels](https://www.qubes-os.org/doc/managing-vm-kernels/)
- [Salt (management software)](https://www.qubes-os.org/doc/salt/)
- [Disposable customization](https://www.qubes-os.org/doc/disposable-customization/)
- [Installing contributed packages](https://www.qubes-os.org/doc/installing-contributed-packages/)
- [How to make any file persistent (bind-dirs)](https://www.qubes-os.org/doc/bind-dirs/)
- [GUI configuration](https://www.qubes-os.org/doc/gui-configuration/)
- [Resize disk image](https://www.qubes-os.org/doc/resize-disk-image/)
- [Qubes service](https://www.qubes-os.org/doc/qubes-service/)
- [How to mount a Qubes partition from another OS](https://www.qubes-os.org/doc/mount-from-other-os/)
- [KDE (desktop environment)](https://www.qubes-os.org/doc/kde/)
- [i3 (window manager)](https://www.qubes-os.org/doc/i3/)
- [AwesomeWM (window manager)](https://www.qubes-os.org/doc/awesomewm/)
## Qubes OS Legends
- [Joanna Rutkowska](https://en.wikipedia.org/wiki/Joanna_Rutkowska)
- [Marek Marczykowski-Górecki](https://github.com/marmarek)
- [unman](https://github.com/unman?tab=repositories)
- [templates](https://qubes.3isec.org/Templates_4.1/)
- [Core Team](https://www.qubes-os.org/team/#core-team)
- You can be one to! You got this! Keep Qubing!
## Training
- [xn0px90](https://patreon.com/xn0px90)
## Streamers
- [xn0px90](https://twitch.tv/xn0px90) - Your's::Trully!::First::Full::Time::Info::Sec::Qubes::OS::streamer!
- [infosecstreams](https://infosecstreams.com/) -A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
## Companies using Qubes OS
- [Qubes Partners](https://www.qubes-os.org/partners/) - The Qubes Project relies greatly on the generous support of the organizations, companies, and individuals who have become Qubes Partners
## Social media
The Qubes OS Project has a presence on the following social media platforms:
- [Forum](https://forum.qubes-os.org/)
- [Twitter](https://twitter.com/QubesOS)
- [Reddit](https://www.reddit.com/r/Qubes/)
- [Facebook](https://www.facebook.com/QubesOS/)
- [LinkedIn](https://www.linkedin.com/company/qubes-os/)
- [Discord](https://discord.gg/YMUbTt7ZRG)
- [Matrix Discord Bridge](https://matrix.to/#/#qubes-os-discord-bridge-v2:matrix.org)
- [Matrix:Qubes OS](https://matrix.to/#/#cybersec-qubes_os:matrix.org)
- [ClubHouse](https://www.clubhouse.com/house/qubes-os)
- `#qubes` channel on libera.chat via traditional IRC clients
- `#qubes-os` channel on irc.anonops.com via traditional IRC clients
## Contributing
Contribution guidelines can be found [here](https://github.com/xn0px90/Awesome-Qubes-OS/blob/master/CONTRIBUTING.md)
## Releases
- [Supported releases](https://www.qubes-os.org/doc/supported-releases/)
- [Testing new releases and updates](https://www.qubes-os.org/doc/testing/)
- [Release notes](https://www.qubes-os.org/doc/releases/notes/)
- [Release schedules](https://www.qubes-os.org/doc/releases/schedules/)
## Adventure Further
- [Adventures start here --->](https://github.com/sindresorhus/awesome) - All the awesome list.
## License
[![Creative Commons License](http://i.creativecommons.org/l/by/4.0/88x31.png)](https://creativecommons.org/licenses/by/4.0/)
This work is licensed under a [Creative Commons Attribution 4.0 International License](http://creativecommons.org/licenses/by/4.0/).
:|: ADVENTURE FURTHER :|: HACK ALL THE THINGS :|: TRUST NOTHING :|: WITH <3! ~X