awesome-qubes-os/README.md
2023-01-22 11:34:29 +00:00

418 lines
29 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&G?~^^~?G&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#5!^::^^^^::^!YB@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#P7^:::^^^^^^^^^^:::^75#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&G?~:::^^^^^^^^^^^^^^^^^^:::~?P&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&BJ!^::^^^^^^^^^^^^::^^^^^^^^^^^^::^~JG&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@#5!^:::^^^^^^^^^^^:::~77~^::^^^^^^^^^^^^::^!Y#@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@J^::^^^^^^^^^^^:::^7P#@@@@&P?~:::^^^^^^^^^^:::^Y@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!7!!~^^^^^^^::^!Y#@@@@@@@@@@@@#57^::^^^^^^~!?Y5YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777!~~^:~JB&@@@@@@@@@@@@@@@@@@&BY~^^!?J55555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!Y@@@@@@@@@@@@@@@@@@@@@@@@@@PY55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!G@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!?#@@@@@@@@@@@@@@@@@@@@@@@@&P555555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@G!777777777!!7YB&@@@@@@@@@@@@@@@@@#GP55555555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@#!!7777777777!!!!?5#&@@@@@@@@@&BP5YY555555555555Y#@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@#J!!!!7777777777!!!7JP#&@&BP5YY5555555555555Y5P#@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@&BY?!!!77777777777!!!7Y5Y5555555555555555G#&@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&GJ7!!!77777777777Y55555555555555555P#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#PJ7!!!7777777Y555555555555555555Y5PG#@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&B5?!!!!777Y5555Y55YY555555555555YY5&@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&BY?!!!Y555G#&@#GP555555555555P#@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#GPB#&@@@@@@@@&BP55555PG#&@@@@@@@@@@@@@@@@@@@@@@@@@@@
_ ___ __ ___ ___
/_\__ __ _____ ___ ___ _ __ ___ / \ _ _| |__ ___ ___ / _ \/ __|
/ _ \ V V / -_|_-</ _ \ ' \/ -_) | (_) | || | '_ \/ -_|_-< | (_) \__ \
/_/ \_\_/\_/\___/__/\___/_|_|_\___| \__\_\\_,_|_.__/\___/__/ \___/|___/
# Awesome Qubes OS [![Track Awesome List](https://www.trackawesomelist.com/badge.svg)](https://www.trackawesomelist.com/xn0px90/Awesome-Qubes-OS/)[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
## A curated list of Awesome Qubes OS links
A security-focused desktop operating system that aims to provide security through isolation.
This list is a collection of tools, projects, images, and resources conforming to the [Awesome Manifesto](https://github.com/sindresorhus/awesome/blob/master/awesome.md).
Contributions *very welcome* but first see [Contributing](#contributing).
## Table of Contents
- [Qubes OS Websites](#qubes-os-websites)
- [System Requirements](#system-requirements)
- [Downloading, Installing, Upgrading, and Building](#downloading-installing-upgrading-and-building)
- [How-to guides](#how-to-guides)
- [Templates](#templates)
- [Qubes OS Server](#qubes-os-server)
- [GPU](#gpu)
- [Desktop Customization](#desktop-customization)
- [VPN](#vpn)
- [Darknet](#darknet)
- [Crypto](#crypto)
- [Videos](#videos)
- [Security](#security)
- [Kernels](#kernels)
- [Unikernels](#unikernels)
- [Unikernel-like](#unikernel-like)
- [Exploitation Tools](#exploitation-tools)
- [Xen Exploitation](#xen-exploitation)
- [VM-Hardening](#vm-hardening)
- [System](#system)
- [Services](#services)
- [Advanced Topics](#advanced-topics)
- [Qubes OS Legends](#qubes-os-legends)
- [Training and Materials](#training-and-materials)
- [Companies using Qubes OS](#companies-using-qubes-os)
- [Social media](#social-media)
- [Contributing](#contributing)
- [Releases](#releases)
- [Adventure Further](#adventure-further)
- [License](#license)
## Qubes OS Websites
- [Qubes OS](https://www.qubes-os.org) - Qubes OS is an operating system built out of securely-isolated compartments called Qubes.
- [Qubes OS Development Documentation](https://dev.qubes-os.org/en/latest/) - Qubes OS development documentation.
- [Qubes OS Documentation](https://www.qubes-os.org/doc/) - Qubes OS main documentation.
- [Qubes OS GitHub Documentation](https://github.com/QubesOS/qubes-doc) - Qubes OS GitHub latest documentation.
- [Qubes OS News](https://www.qubes-os.org/news/) - Latest Qubes OS News.
- [Qubes OS Onion](http://www.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion) - Qubes OS onion address on the Tor network.
## System Requirements
- [Certified Hardware](https://www.qubes-os.org/doc/certified-hardware/)
- [Community-recommended hardware](https://www.qubes-os.org/doc/community-recommended-hardware/)
- [Hardware compatibility list (HCL)](https://www.qubes-os.org/hcl/)
- [System Requirements](https://www.qubes-os.org/doc/system-requirements/)
## Downloading, Installing, Upgrading, and Building
- [Building](https://github.com/QubesOS/qubes-builderv2) - This is the second generation of the Qubes OS builder.
- [Installing](https://www.qubes-os.org/doc/installation-guide/) - Qubes OS installation guide!
- [Qubes OS 4.1.1](https://www.qubes-os.org/downloads/) - Qubes OS 4.1.1 download.
- [Qubes OS 4.1.2 Weekly Builds](https://qubes.notset.fr/iso/) - Qubes OS 4.1.2 Weekly Build download.
- [Upgrading](https://www.qubes-os.org/doc/upgrade/) - These guides are for upgrading from one version of Qubes to another.
## How-to guides
- [How to back up, restore, and migrate](https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/)
- [How to copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/)
- [How to copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/)
- [How to copy from dom0](https://www.qubes-os.org/doc/how-to-copy-from-dom0/)
- [How to enter fullscreen mode](https://www.qubes-os.org/doc/how-to-enter-fullscreen-mode/)
- [How to install software](https://www.qubes-os.org/doc/how-to-install-software/)
- [How to update](https://www.qubes-os.org/doc/how-to-update/)
- [How to use PCI devices](https://www.qubes-os.org/doc/how-to-use-pci-devices/)
- [How to use USB devices](https://www.qubes-os.org/doc/how-to-use-usb-devices/)
- [How to use block storage devices](https://www.qubes-os.org/doc/how-to-use-block-storage-devices/)
- [How to use devices](https://www.qubes-os.org/doc/how-to-use-devices/)
- [How to use disposables](https://www.qubes-os.org/doc/how-to-use-disposables/)
- [How to use optical discs](https://www.qubes-os.org/doc/how-to-use-optical-discs/)
## Templates
- [Creating a NetBSD VM](https://github.com/Qubes-Community/Contents/blob/master/docs/os/netbsd.md)
- [Customizing Fedora minimal templates](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/fedora-minimal-template-customization.md)
- [Customizing Windows 7 templates](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/windows-template-customization.md)
- [Debian templates](https://www.qubes-os.org/doc/templates/debian/)
- [Fedora templates](https://www.qubes-os.org/doc/templates/fedora/)
- [Minimal templates](https://www.qubes-os.org/doc/templates/minimal/)
- [Pentesting: BlackArch](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/blackarch.md)
- [Pentesting: Kali](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/kali.md)
- [Pentesting: PTF](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/ptf.md)
- [Pentesting: Parrot](https://www.parrotsec.org/docs/parrot-on-qubesos.html)
- [Template: CentOS](https://github.com/Qubes-Community/Contents/blob/master/docs/os/centos.md)
- [Template: Gentoo](https://github.com/Qubes-Community/Contents/blob/master/docs/os/gentoo.md)
- [Template: Ubuntu](https://github.com/Qubes-Community/Contents/blob/master/docs/os/ubuntu.md)
- [Template: Whonix](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/whonix.md)
- [Template: Windows](https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows-vm.md)
- [Templates](https://www.qubes-os.org/doc/templates/)
- [Tips for Using Linux in an HVM](https://github.com/Qubes-Community/Contents/blob/master/docs/os/linux-hvm-tips.md)
- [Xfce templates](https://www.qubes-os.org/doc/templates/xfce/)
## Qubes OS Server
- [Ansible](https://qubes-ansible.readthedocs.io/en/latest/) - Automation with Ansible.
- [Qubes-network-server](https://github.com/Rudd-O/qubes-network-server) - Turn your Qubes OS into a networking server.
- [Qubes-remote-desktop](https://github.com/QubesOS-contrib/qubes-remote-desktop) - SystemD services for creating VNC server session in dom0 or any qube.
## GPU
- [GUI-configuration](https://www.qubes-os.org/doc/gui-configuration/)
- [GUI-domain](https://www.qubes-os.org/doc/gui-domain/)
- [GUI-troubleshooting](https://www.qubes-os.org/doc/gui-troubleshooting/)
- [GUI-virtualization](https://www.qubes-os.org/doc/gui/)
- [How-to-use-pci-devices](https://www.qubes-os.org/doc/how-to-use-pci-devices/)
- [Install-nvidia-driver](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/install-nvidia-driver.md)
- [Nvidia-troubleshooting](https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/nvidia-troubleshooting.md)
- [Windows-gaming-hvm](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/windows-gaming-hvm.md)
## Desktop Customization
- [AwesomeWM (window manager)](https://www.qubes-os.org/doc/awesomewm/)
- [Brightness-Ajustment](https://forum.qubes-os.org/t/easy-brightness-adjustment/15902/2)
- [Custom icons](https://forum.qubes-os.org/t/where-is-the-most-optimal-place-to-put-custom-folder-icons/15740/3)
- [i3 (window manager)](https://www.qubes-os.org/doc/i3/)
- [KDE (desktop environment)](https://www.qubes-os.org/doc/kde/)
- [Qubes-GUI-Rust](https://github.com/QubesOS/qubes-gui-rust)
- [Suckless dwm](https://github.com/3o14r473/GUIDE_how-to-install-dwm-in-qubesos) - How to install dwm in Qubes OS.
## VPN
- [How To make a VPN Gateway in Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md) - Qubes includes a number of tools that can make the client-side setup of your VPN more versatile and secure.
- [Qubes-Tunnel](https://github.com/QubesOS-contrib/qubes-tunnel) - Manage, run, protect VPN connections in Proxy VMs.
- [Mullvad VPN](https://mullvad.net/en/help/qubes-os-4-and-mullvad-vpn/) - Privacy first VPN provider in Qubes OS.
- [WireGuard](https://github.com/Qubes-Community/Contents/tree/master/docs/wireguard) - WireGuard: fast, modern, secure VPN tunnel.
## Darknet
- [i2p-whonix](https://forum.qubes-os.org/t/temporary-way-to-run-i2p-on-qubes-whonix/15861) - Temporary way to run i2p on qubes-whonix.
- [ipfs](https://github.com/ipfs/ipfs) - A peer-to-peer hypermedia protocol to make the web faster, safer, and more open.
- [Lokinet](https://github.com/oxen-io/lokinet) - Lokinet is the reference implementation of LLARP (low latency anonymous routing protocol), a layer 3 onion routing protocol.
- [Whonix](https://www.whonix.org/wiki/Qubes) - Qubes-Whonix ™ is the seamless combination of Qubes OS and Whonix™ for advanced security and anonymity.
## Crypto
- [Split Bitcoin Wallet](https://github.com/Qubes-Community/Contents/blob/master/docs/security/split-bitcoin.md) - A "split" bitcoin wallet is a strategy of protecting your bitcoin by having your wallet split into an offline "cold storage" wallet and an online "watching only" wallet.
- [Awesome-DeSci](https://github.com/DeSciWorldDAO/awesome-desci) - A curated list of awesome Decentralized Science (DeSci) resources, projects, articles and more.
## Videos
- [3mdeb](https://3mdeb.com/)
- [Explaining Computers presents “Qubes OS: Security Oriented Operating System”](https://www.youtube.com/watch?v=hWDvS_Mp6gc)
- [GPU Virtual Machine (GVM) - An OpenMdev Project (Qubes OS Summit 2022)](https://www.youtube.com/watch?v=YllX-ud70Nk)
- [GPU Virtual Machine (GVM) - An OpenMdev Project (Qubes OS Summit 2022)](https://www.youtube.com/watch?v=YllX-ud70Nk)
- [Qubes OS summit 2022: Day 1](https://www.youtube.com/watch?v=hkWWz3xGqS8)
- [Qubes OS summit 2022: Day 2](https://www.youtube.com/watch?v=A9GrlQsQc7Q)
- [Qubes OS-3mdeb mini-summit 2021: Day 1](https://www.youtube.com/watch?v=y3V_V0Vllas)
- [Qubes OS-3mdeb mini-summit 2021: Day 2](https://www.youtube.com/watch?v=KdDr6TiqF0k)
- [Micah Lee presents “Qubes OS: The Operating System That Can Protect You Even If You Get Hacked”](https://livestream.com/accounts/9197973/events/8286152/videos/178431606)
- [UX Bessie](https://vimeo.com/542041258) - Qubes OS AppMenu Design Direction. Part of 2020/21 MOSS funded UX work.
- [UX Jackie](https://vimeo.com/541946756) - Qubes OS AppMenu Design Direction. Part of 2020/21 MOSS funded UX work.
## Security
- [Anonymizing your MAC Address](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/anonymizing-your-mac-address.md)
- [Anti Evil Maid (AEM)](https://www.qubes-os.org/doc/anti-evil-maid/)
- [Data leaks](https://www.qubes-os.org/doc/data-leaks/)
- [Device handling security](https://www.qubes-os.org/doc/device-handling-security/)
- [Firewall](https://www.qubes-os.org/doc/firewall/)
- [Passwordless root access in Qubes](https://www.qubes-os.org/doc/vm-sudo/)
- [Reducing the fingerprint of the text-based web browser w3m](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/w3m.md)
- [Running Tails in Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/tails.md)
- [Signal](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/signal.md)
- [Split GPG](https://www.qubes-os.org/doc/split-gpg/)
- [Split SSH](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/split-ssh.md)
- [Split dm-crypt](https://github.com/rustybird/qubes-split-dm-crypt)
- [U2F proxy](https://www.qubes-os.org/doc/u2f-proxy/)
- [Using Multi-Factor Authentication with Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/security/multifactor-authentication.md)
- [Using OnlyKey with Qubes OS](https://docs.crp.to/qubes.html)
- [Whonix for Privacy & Anonymity](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/whonix.md)
- [YubiKey](https://www.qubes-os.org/doc/yubikey/)
## Vitualization
- [Awesome-Virtualization](https://github.com/Wenzel/awesome-virtualization) - A curated list of awesome resources about virtualization.
## Kernels
- [eBPF](https://ebpf.io) - eBPF is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in an operating system kernel.
### Microkernels
- [OpenXT](https://openxt.org/) - OpenXT is an open-source development toolkit for hardware-assisted security research and appliance integration.
- [Qubes-linux-kernel](https://github.com/QubesOS/qubes-linux-kernel) - Qubes package for Linux kernel.
- [seL4](https://sel4.systems/) - seL4 is a high-assurance, high-performance operating system microkernel.
### Unikernels
- [Awesome-Unikernels](https://github.com/uniqernel/awesome-unikernels) - Secure, lightweight and high performance approach to application delivery.
- [ClickOS](http://cnp.neclab.eu/projects/clickos) - Efficient network function virtualization platform, optimized for Xen and developed by NEC.
- [Clive](http://lsub.org/ls/clive.html) - Research project from Rey Juan Carlos University (Madrid), developed in Go.
- [HaLVM](https://galois.com/project/halvm) - Port of Glasgow Haskell compiler producing Xen optimized unikernels.
- [Mini-OS](https://wiki.xen.org/wiki/Mini-OS) - Reference kernel distributed with Xen.
- [Qubes-Mirage-Firewall](https://github.com/mirage/qubes-mirage-firewall) - A unikernel that can run as a Qubes OS ProxyVM, replacing sys-firewall.
### Unikernel-like
- [Drawbridge](https://www.microsoft.com/en-us/research/project/drawbridge) - Research prototype platform from Microsoft.
- [Graphene](https://github.com/oscarlab/graphene) - Library OS optimized for Intel SGX.
## Exploitation Tools
- [American Fuzzy Lop](https://github.com/google/AFL) - Fuzzing is one of the most powerful and proven strategies for identifying security issues in real-world software
- [Awesome-Fuzzing](https://github.com/cpuu/awesome-fuzzing) - A curated list of references to awesome Fuzzing for security testing. Additionally there is a collection of freely available academic papers, tools and so on.
- [Bonzai](https://github.com/rwxrob/bonzai) - It's like a modular, multicall BusyBox builder for Go with built in completion and embedded documentation support.
- [CodeQL](https://codeql.github.com/) - Discover vulnerabilities across a codebase with CodeQL.
- [Joern](https://github.com/joernio/joern) - Joern is a platform for analyzing source code, bytecode, and binary executables. It generates code property graphs (CPGs), a graph representation of code for cross-language code analysis.
- [LeechCore](https://github.com/ufrisk/LeechCore) - The LeechCore Memory Acquisition Library focuses on Physical Memory Acquisition using various hardware and software based methods.
- [LeechCore-Plugins](https://github.com/ufrisk/LeechCore-plugins) - This repository contains various plugins for LeechCore - Physical Memory Acquisition Library.
- [Libvmi](https://libvmi.com/) - LibVMI is a C library with Python bindings that makes it easy to monitor the low-level details of a running virtual machine.
- [Memflow](https://github.com/memflow/memflow) - memflow is a library that enables introspection of various machines (hardware, virtual machines, memory dumps) in a generic fashion.
- [Capstone](https://www.capstone-engine.org/) - Capstone is a lightweight multi-platform, multi-architecture disassembly framework.
- [Coredump](https://github.com/memflow/memflow-coredump) - Access Microsoft Windows Coredump files.
- [Kvm](https://github.com/memflow/memflow-kvm) - KVM memflow connector.
- [Pcileech](https://github.com/memflow/memflow-pcileech) - Access pcileech interface.
- [Qemu_procfs](https://github.com/memflow/memflow-qemu-procfs) - Access QEMU Physical memory.
- [Unicorn](https://www.unicorn-engine.org/) - Unicorn is a lightweight multi-platform, multi-architecture CPU emulator framework.
- [MemProcFS](https://github.com/ufrisk/MemProcFS) - MemProcFS is an easy and convenient way of viewing physical memory as files in a virtual file system.
- [MemProcFS-Plugins](https://github.com/ufrisk/MemProcFS-plugins) - This repository contains various non-core plugins for MemProcFS - The Memory Process File System.
- [Microlibvmi](https://github.com/Wenzel/libmicrovmi) - A cross-platform unified Virtual Machine Introspection API library.
- [Radare2](https://github.com/radareorg/radare2) - Libre Reversing Framework for Unix Geeks.
- [Volatility3](https://github.com/volatilityfoundation/volatility3) - Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples.
## Xen Exploitation
### Video Presentations
- [Advanced Exploitation: Xen Hypervisor VM Escape](https://www.youtube.com/watch?v=6Ld5CiInrcI)
- [Attacking Hypervisors Using Firmware And Hardware](https://www.youtube.com/watch?v=nyW3eTobXAI) - [[PDF Slides]](http://c7zero.info/stuff/AttackingHypervisorsViaFirmware_bhusa15_dc23.pdf)
- [Blackhat 2010 - Hacking the Hypervisor](https://www.youtube.com/watch?v=sTC9x5hYYFo)
- [Lessons Learned from Eight Years of Breaking Hypervisors](https://www.youtube.com/watch?v=PJWJjb0uxXE) - [[Website Slides]](https://www.blackhat.com/docs/eu-14/materials/eu-14-Wojtczuk-Lessons-Learned-From-Eight-Years-Of-Breaking-Hypervisors.pdf)
- [Ouroboros: Tearing Xen Hypervisor With the Snake](https://www.youtube.com/watch?v=kt3kX94kWcM)
- [Software Attacks on Hypervisor Emulation of Hardware](https://www.youtube.com/watch?v=c4DnlP88D2Y) - [[PDF Slides]](https://www.troopers.de/downloads/troopers17/TR17_Attacking_hypervisor_through_hardwear_emulation.pdf)
- [The Arms Race Over Virtualization](https://www.youtube.com/watch?v=nWvg7NKwOjg) - [[PDF Slides]](https://www.blackhat.com/docs/us-16/materials/us-16-Luan-Ouroboros-Tearing-Xen-Hypervisor-With-The-Snake.pdf)
- [XenPwn: Breaking Paravirtualized Devices](https://www.youtube.com/watch?v=qxz8MzE3QME) - [[PDF Slide]](https://www.blackhat.com/docs/us-16/materials/us-16-Wilhelm-Xenpwn-Breaking-Paravirtualized-Devices-wp.pdf)
### PDF Papers
- [Bluepilling the Xen Hypervisor [PDF]](https://invisiblethingslab.com/resources/bh08/part3.pdf)
- [Hypervisor Vulnerability Research - State of the Art [PDF]](https://alisa.sh/slides/HypervisorVulnerabilityResearch2020.pdf)
- [Preventing and Detecting Xen Hypervisor Subversions [PDF]](https://invisiblethingslab.com/resources/bh08/part2.pdf)
- [Subverting the Xen Hypervisor [PDF]](https://invisiblethingslab.com/resources/bh08/part1.pdf)
### Web articles
- [Glitches in the Matrix Escape via NMI](https://www.cpl0.com/blog/?p=46)
- [Xen exploitation part 1: XSA-105, from nobody to root](https://blog.quarkslab.com/xen-exploitation-part-1-xsa-105-from-nobody-to-root.html)
- [Xen exploitation part 2: XSA-148, from guest to host](https://blog.quarkslab.com/xen-exploitation-part-2-xsa-148-from-guest-to-host.html)
## VM-Hardening
- [Kicksecure](https://www.kicksecure.com/wiki/Kicksecure-Qubes_Security)
- [Qcrypt](https://github.com/3hhh/qcrypt)
- [Qubes-VM-hardening](https://github.com/tasket/Qubes-VM-hardening)
## System
- [Architecture](https://www.qubes-os.org/doc/architecture/)
- [Audio virtualization](https://www.qubes-os.org/doc/audio-virtualization/)
- [Networking](https://www.qubes-os.org/doc/networking/)
- [Qubes core admin client](https://www.qubes-os.org/doc/qubes-core-admin-client/)
- [Qubes core admin](https://www.qubes-os.org/doc/qubes-core-admin/)
- [Qubes core stack](https://www.qubes-os.org/doc/qubes-core-stack/)
- [Security design goals](https://www.qubes-os.org/doc/security-design-goals/)
- [Security-critical code](https://www.qubes-os.org/doc/security-critical-code/)
- [Storage pools](https://www.qubes-os.org/doc/storage-pools/)
- [Template implementation](https://www.qubes-os.org/doc/template-implementation/)
- [Template manager](https://www.qubes-os.org/doc/template-manager/)
## Services
- [Admin API](https://www.qubes-os.org/doc/admin-api/)
- [Dom0 secure updates](https://www.qubes-os.org/doc/dom0-secure-updates/)
- [Inter-qube file copying (qfilecopy)](https://www.qubes-os.org/doc/qfilecopy/)
- [Qrexec: Qubes RPC internals](https://www.qubes-os.org/doc/qrexec-internals/)
- [Qrexec: secure communication across domains](https://www.qubes-os.org/doc/qrexec/)
- [Qrexec: socket-based services](https://www.qubes-os.org/doc/qrexec-socket-services/)
- [Qubes memory manager (qmemman)](https://www.qubes-os.org/doc/qmemman/)
## Advanced Topics
- [Config files](https://www.qubes-os.org/doc/config-files/)
- [Disposable customization](https://www.qubes-os.org/doc/disposable-customization/)
- [How to install software in dom0](https://www.qubes-os.org/doc/how-to-install-software-in-dom0/)
- [How to make any file persistent (bind-dirs)](https://www.qubes-os.org/doc/bind-dirs/)
- [How to mount a Qubes partition from another OS](https://www.qubes-os.org/doc/mount-from-other-os/)
- [Installing contributed packages](https://www.qubes-os.org/doc/installing-contributed-packages/)
- [Managing qube kernels](https://www.qubes-os.org/doc/managing-vm-kernels/)
- [Qubes service](https://www.qubes-os.org/doc/qubes-service/)
- [RPC policies](https://www.qubes-os.org/doc/rpc-policy/)
- [Resize disk image](https://www.qubes-os.org/doc/resize-disk-image/)
- [SaltStack (management software)](https://www.qubes-os.org/doc/salt/)
- [Secondary storage](https://www.qubes-os.org/doc/secondary-storage/)
- [Standalones and HVMs](https://www.qubes-os.org/doc/standalones-and-hvms/)
- [USB Qubes](https://www.qubes-os.org/doc/usb-qubes/)
- [Volume backup and revert](https://www.qubes-os.org/doc/volume-backup-revert/)
- [Windows Qubes](https://www.qubes-os.org/doc/windows/)
## Qubes OS Legends
- [Joanna Rutkowska](https://en.wikipedia.org/wiki/Joanna_Rutkowska) - Founder of Qubes OS.
- [Blog](https://blog.invisiblethings.org/) - Personal Blog.
- [Marek Marczykowski-Górecki](https://github.com/marmarek) - Lead developer at Qubes OS.
- [Ninavizz](https://vimeo.com/user1589693) - Qubes OS UX Designer.
- [Unman](https://github.com/unman?tab=repositories)
- [Templates](https://qubes.3isec.org/Templates_4.1/)
- [Unman Install Scripts](https://github.com/unman/shaker)
- [Core Team](https://www.qubes-os.org/team/#core-team)
## Training and Materials
- [Training-materials](https://github.com/QubesOS/training-materials/) - A Collection of training materials for Qubes OS.
- [Qubes-diagrams](https://github.com/rootkovska/qubes-diagrams) - Qubes OS architecture diagrams.
- [Qubes-artwork](https://github.com/QubesOS/qubes-artwork) - This repository contains various artworks for Qubes OS.
- [pwn.college](https://pwn.college/) - pwn.college is an education platform for students (and other interested parties) to learn about, and practice, core cybersecurity concepts in a hands-on fashion.
- [Anonymous Planet](https://anonymousplanet.org) - The Hitchhikers Guide to Online Anonymity: the comprehensive guide for online anonymity and OpSec.
- [Anonymous Planet Onion](http://thgtoa27ujspeqxasrfvcf5aozqdczvgmwgorrmblh6jn4nino3spcqd.onion/) - For those who wish to read over the anonymous Tor network.
- [Privacy-Security-Anonymity Matrix Space](https://psa.anonymousplanet.org/) - The place to be for all topics regarding privacy, anonymity and other subjects. Rooms are click-to-join.
- [xn0px90](https://patreon.com/xn0px90) - Qubes training every second and fourth weekends of every month, from Friday to Monday, covering beginner, intermediate, and advanced levels.
## Streamers
- [Infosecstreams](https://infosecstreams.com/) - An actively maintained activity-based-autosorted list of InfoSec Streamers
- [xn0px90](https://twitch.tv/xn0px90) - Your's::Trully!::First::Full::Time::Info::Sec::Qubes::OS::Streamer!
## Companies using Qubes OS
- [Qubes Partners](https://www.qubes-os.org/partners/) - The Qubes Project relies greatly on the generous support of the organizations, companies, and individuals who have become Qubes Partners.
## Social media
The Qubes OS Project has a presence on the following social media platforms:
- [ClubHouse](https://www.clubhouse.com/house/qubes-os)
- [Discord](https://discord.gg/YMUbTt7ZRG)
- [Facebook](https://www.facebook.com/QubesOS/)
- [Forum](https://forum.qubes-os.org/)
- [LinkedIn](https://www.linkedin.com/company/qubes-os/)
- [Mastodon](https://mastodon.social/@QubesOS)
- [Matrix Discord Bridge](https://matrix.to/#/#qubes-os-discord-bridge-v2:matrix.org)
- [Matrix:Qubes OS](https://matrix.to/#/#cybersec-qubes_os:matrix.org)
- [Reddit Qubes OS](https://www.reddit.com/r/Qubes/)
- [Reddit hacking_qubes_os](https://www.reddit.com/r/hacking_qubes_os)
- [Reddit hack_with_qubes_os](https://www.reddit.com/r/hack_with_qubes_os)
- [Twitter](https://twitter.com/QubesOS)
- `#xen` channel on irc.oftc.net via traditional IRC clients.
- `#qubes` channel on irc.libera.chat via traditional IRC clients.
- `#qubes-os` channel on irc.anonops.com via traditional IRC clients.
## Contributing
Contribution guidelines can be found [here](https://github.com/xn0px90/Awesome-Qubes-OS/blob/master/CONTRIBUTING.md).
## Releases
- [Release notes](https://www.qubes-os.org/doc/releases/notes/)
- [Release schedules](https://www.qubes-os.org/doc/releases/schedules/)
- [Supported releases](https://www.qubes-os.org/doc/supported-releases/)
- [Testing new releases and updates](https://www.qubes-os.org/doc/testing/)
## Adventure Further
- Adventures start here ---> [Adventure Here!](https://github.com/sindresorhus/awesome) - All the awesome list.
**[⬆ back to top](#awesome-qubes-os-)**
## License
[![Creative Commons License](http://i.creativecommons.org/l/by/1.0/88x31.png)](https://creativecommons.org/licenses/by/1.0/)
This work is licensed under a [Creative Commons Attribution 1.0 Generic](http://creativecommons.org/licenses/by/1.0/).
:|: ADVENTURE FURTHER :|: HACK ALL THE THINGS :|: TRUST NOTHING :|: WITH <3! ~X