mirror of
https://github.com/xn0px90/awesome-qubes-os.git
synced 2024-10-01 06:35:43 -04:00
418 lines
29 KiB
Markdown
418 lines
29 KiB
Markdown
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&G?~^^~?G&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#5!^::^^^^::^!YB@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#P7^:::^^^^^^^^^^:::^75#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&G?~:::^^^^^^^^^^^^^^^^^^:::~?P&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&BJ!^::^^^^^^^^^^^^::^^^^^^^^^^^^::^~JG&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@#5!^:::^^^^^^^^^^^:::~77~^::^^^^^^^^^^^^::^!Y#@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@J^::^^^^^^^^^^^:::^7P#@@@@&P?~:::^^^^^^^^^^:::^Y@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@G!7!!~^^^^^^^::^!Y#@@@@@@@@@@@@#57^::^^^^^^~!?Y5YB@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777!~~^:~JB&@@@@@@@@@@@@@@@@@@&BY~^^!?J55555YB@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!Y@@@@@@@@@@@@@@@@@@@@@@@@@@PY55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!B@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!G@@@@@@@@@@@@@@@@@@@@@@@@@@&Y55555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@G!77777777!?#@@@@@@@@@@@@@@@@@@@@@@@@&P555555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@G!777777777!!7YB&@@@@@@@@@@@@@@@@@#GP55555555555YB@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@#!!7777777777!!!!?5#&@@@@@@@@@&BP5YY555555555555Y#@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@#J!!!!7777777777!!!7JP#&@&BP5YY5555555555555Y5P#@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@&BY?!!!77777777777!!!7Y5Y5555555555555555G#&@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&GJ7!!!77777777777Y55555555555555555P#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#PJ7!!!7777777Y555555555555555555Y5PG#@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&B5?!!!!777Y5555Y55YY555555555555YY5&@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&BY?!!!Y555G#&@#GP555555555555P#@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#GPB#&@@@@@@@@&BP55555PG#&@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
|
||
_ ___ __ ___ ___
|
||
/_\__ __ _____ ___ ___ _ __ ___ / \ _ _| |__ ___ ___ / _ \/ __|
|
||
/ _ \ V V / -_|_-</ _ \ ' \/ -_) | (_) | || | '_ \/ -_|_-< | (_) \__ \
|
||
/_/ \_\_/\_/\___/__/\___/_|_|_\___| \__\_\\_,_|_.__/\___/__/ \___/|___/
|
||
|
||
# Awesome Qubes OS [![Track Awesome List](https://www.trackawesomelist.com/badge.svg)](https://www.trackawesomelist.com/xn0px90/Awesome-Qubes-OS/)[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
|
||
|
||
## A curated list of Awesome Qubes OS links
|
||
|
||
A security-focused desktop operating system that aims to provide security through isolation.
|
||
|
||
This list is a collection of tools, projects, images, and resources conforming to the [Awesome Manifesto](https://github.com/sindresorhus/awesome/blob/master/awesome.md).
|
||
|
||
Contributions *very welcome* but first see [Contributing](#contributing).
|
||
|
||
## Table of Contents
|
||
|
||
- [Qubes OS Websites](#qubes-os-websites)
|
||
- [System Requirements](#system-requirements)
|
||
- [Downloading, Installing, Upgrading, and Building](#downloading-installing-upgrading-and-building)
|
||
- [How-to guides](#how-to-guides)
|
||
- [Templates](#templates)
|
||
- [Qubes OS Server](#qubes-os-server)
|
||
- [GPU](#gpu)
|
||
- [Desktop Customization](#desktop-customization)
|
||
- [VPN](#vpn)
|
||
- [Darknet](#darknet)
|
||
- [Crypto](#crypto)
|
||
- [Videos](#videos)
|
||
- [Security](#security)
|
||
- [Kernels](#kernels)
|
||
- [Unikernels](#unikernels)
|
||
- [Unikernel-like](#unikernel-like)
|
||
- [Exploitation Tools](#exploitation-tools)
|
||
- [Xen Exploitation](#xen-exploitation)
|
||
- [VM-Hardening](#vm-hardening)
|
||
- [System](#system)
|
||
- [Services](#services)
|
||
- [Advanced Topics](#advanced-topics)
|
||
- [Qubes OS Legends](#qubes-os-legends)
|
||
- [Training and Materials](#training-and-materials)
|
||
- [Companies using Qubes OS](#companies-using-qubes-os)
|
||
- [Social media](#social-media)
|
||
- [Contributing](#contributing)
|
||
- [Releases](#releases)
|
||
- [Adventure Further](#adventure-further)
|
||
- [License](#license)
|
||
|
||
## Qubes OS Websites
|
||
|
||
- [Qubes OS](https://www.qubes-os.org) - Qubes OS is an operating system built out of securely-isolated compartments called Qubes.
|
||
- [Qubes OS Development Documentation](https://dev.qubes-os.org/en/latest/) - Qubes OS development documentation.
|
||
- [Qubes OS Documentation](https://www.qubes-os.org/doc/) - Qubes OS main documentation.
|
||
- [Qubes OS GitHub Documentation](https://github.com/QubesOS/qubes-doc) - Qubes OS GitHub latest documentation.
|
||
- [Qubes OS News](https://www.qubes-os.org/news/) - Latest Qubes OS News.
|
||
- [Qubes OS Onion](http://www.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion) - Qubes OS onion address on the Tor network.
|
||
|
||
## System Requirements
|
||
|
||
- [Certified Hardware](https://www.qubes-os.org/doc/certified-hardware/)
|
||
- [Community-recommended hardware](https://www.qubes-os.org/doc/community-recommended-hardware/)
|
||
- [Hardware compatibility list (HCL)](https://www.qubes-os.org/hcl/)
|
||
- [System Requirements](https://www.qubes-os.org/doc/system-requirements/)
|
||
|
||
## Downloading, Installing, Upgrading, and Building
|
||
|
||
- [Building](https://github.com/QubesOS/qubes-builderv2) - This is the second generation of the Qubes OS builder.
|
||
- [Installing](https://www.qubes-os.org/doc/installation-guide/) - Qubes OS installation guide!
|
||
- [Qubes OS 4.1.1](https://www.qubes-os.org/downloads/) - Qubes OS 4.1.1 download.
|
||
- [Qubes OS 4.1.2 Weekly Builds](https://qubes.notset.fr/iso/) - Qubes OS 4.1.2 Weekly Build download.
|
||
- [Upgrading](https://www.qubes-os.org/doc/upgrade/) - These guides are for upgrading from one version of Qubes to another.
|
||
|
||
## How-to guides
|
||
|
||
- [How to back up, restore, and migrate](https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/)
|
||
- [How to copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/)
|
||
- [How to copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/)
|
||
- [How to copy from dom0](https://www.qubes-os.org/doc/how-to-copy-from-dom0/)
|
||
- [How to enter fullscreen mode](https://www.qubes-os.org/doc/how-to-enter-fullscreen-mode/)
|
||
- [How to install software](https://www.qubes-os.org/doc/how-to-install-software/)
|
||
- [How to update](https://www.qubes-os.org/doc/how-to-update/)
|
||
- [How to use PCI devices](https://www.qubes-os.org/doc/how-to-use-pci-devices/)
|
||
- [How to use USB devices](https://www.qubes-os.org/doc/how-to-use-usb-devices/)
|
||
- [How to use block storage devices](https://www.qubes-os.org/doc/how-to-use-block-storage-devices/)
|
||
- [How to use devices](https://www.qubes-os.org/doc/how-to-use-devices/)
|
||
- [How to use disposables](https://www.qubes-os.org/doc/how-to-use-disposables/)
|
||
- [How to use optical discs](https://www.qubes-os.org/doc/how-to-use-optical-discs/)
|
||
|
||
## Templates
|
||
|
||
- [Creating a NetBSD VM](https://github.com/Qubes-Community/Contents/blob/master/docs/os/netbsd.md)
|
||
- [Customizing Fedora minimal templates](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/fedora-minimal-template-customization.md)
|
||
- [Customizing Windows 7 templates](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/windows-template-customization.md)
|
||
- [Debian templates](https://www.qubes-os.org/doc/templates/debian/)
|
||
- [Fedora templates](https://www.qubes-os.org/doc/templates/fedora/)
|
||
- [Minimal templates](https://www.qubes-os.org/doc/templates/minimal/)
|
||
- [Pentesting: BlackArch](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/blackarch.md)
|
||
- [Pentesting: Kali](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/kali.md)
|
||
- [Pentesting: PTF](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/ptf.md)
|
||
- [Pentesting: Parrot](https://www.parrotsec.org/docs/parrot-on-qubesos.html)
|
||
- [Template: CentOS](https://github.com/Qubes-Community/Contents/blob/master/docs/os/centos.md)
|
||
- [Template: Gentoo](https://github.com/Qubes-Community/Contents/blob/master/docs/os/gentoo.md)
|
||
- [Template: Ubuntu](https://github.com/Qubes-Community/Contents/blob/master/docs/os/ubuntu.md)
|
||
- [Template: Whonix](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/whonix.md)
|
||
- [Template: Windows](https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows-vm.md)
|
||
- [Templates](https://www.qubes-os.org/doc/templates/)
|
||
- [Tips for Using Linux in an HVM](https://github.com/Qubes-Community/Contents/blob/master/docs/os/linux-hvm-tips.md)
|
||
- [Xfce templates](https://www.qubes-os.org/doc/templates/xfce/)
|
||
|
||
## Qubes OS Server
|
||
|
||
- [Ansible](https://qubes-ansible.readthedocs.io/en/latest/) - Automation with Ansible.
|
||
- [Qubes-network-server](https://github.com/Rudd-O/qubes-network-server) - Turn your Qubes OS into a networking server.
|
||
- [Qubes-remote-desktop](https://github.com/QubesOS-contrib/qubes-remote-desktop) - SystemD services for creating VNC server session in dom0 or any qube.
|
||
|
||
## GPU
|
||
|
||
- [GUI-configuration](https://www.qubes-os.org/doc/gui-configuration/)
|
||
- [GUI-domain](https://www.qubes-os.org/doc/gui-domain/)
|
||
- [GUI-troubleshooting](https://www.qubes-os.org/doc/gui-troubleshooting/)
|
||
- [GUI-virtualization](https://www.qubes-os.org/doc/gui/)
|
||
- [How-to-use-pci-devices](https://www.qubes-os.org/doc/how-to-use-pci-devices/)
|
||
- [Install-nvidia-driver](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/install-nvidia-driver.md)
|
||
- [Nvidia-troubleshooting](https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/nvidia-troubleshooting.md)
|
||
- [Windows-gaming-hvm](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/windows-gaming-hvm.md)
|
||
|
||
## Desktop Customization
|
||
|
||
- [AwesomeWM (window manager)](https://www.qubes-os.org/doc/awesomewm/)
|
||
- [Brightness-Ajustment](https://forum.qubes-os.org/t/easy-brightness-adjustment/15902/2)
|
||
- [Custom icons](https://forum.qubes-os.org/t/where-is-the-most-optimal-place-to-put-custom-folder-icons/15740/3)
|
||
- [i3 (window manager)](https://www.qubes-os.org/doc/i3/)
|
||
- [KDE (desktop environment)](https://www.qubes-os.org/doc/kde/)
|
||
- [Qubes-GUI-Rust](https://github.com/QubesOS/qubes-gui-rust)
|
||
- [Suckless dwm](https://github.com/3o14r473/GUIDE_how-to-install-dwm-in-qubesos) - How to install dwm in Qubes OS.
|
||
|
||
## VPN
|
||
|
||
- [How To make a VPN Gateway in Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md) - Qubes includes a number of tools that can make the client-side setup of your VPN more versatile and secure.
|
||
- [Qubes-Tunnel](https://github.com/QubesOS-contrib/qubes-tunnel) - Manage, run, protect VPN connections in Proxy VMs.
|
||
- [Mullvad VPN](https://mullvad.net/en/help/qubes-os-4-and-mullvad-vpn/) - Privacy first VPN provider in Qubes OS.
|
||
- [WireGuard](https://github.com/Qubes-Community/Contents/tree/master/docs/wireguard) - WireGuard: fast, modern, secure VPN tunnel.
|
||
|
||
## Darknet
|
||
|
||
- [i2p-whonix](https://forum.qubes-os.org/t/temporary-way-to-run-i2p-on-qubes-whonix/15861) - Temporary way to run i2p on qubes-whonix.
|
||
- [ipfs](https://github.com/ipfs/ipfs) - A peer-to-peer hypermedia protocol to make the web faster, safer, and more open.
|
||
- [Lokinet](https://github.com/oxen-io/lokinet) - Lokinet is the reference implementation of LLARP (low latency anonymous routing protocol), a layer 3 onion routing protocol.
|
||
- [Whonix](https://www.whonix.org/wiki/Qubes) - Qubes-Whonix ™ is the seamless combination of Qubes OS and Whonix™ for advanced security and anonymity.
|
||
|
||
## Crypto
|
||
|
||
- [Split Bitcoin Wallet](https://github.com/Qubes-Community/Contents/blob/master/docs/security/split-bitcoin.md) - A "split" bitcoin wallet is a strategy of protecting your bitcoin by having your wallet split into an offline "cold storage" wallet and an online "watching only" wallet.
|
||
- [Awesome-DeSci](https://github.com/DeSciWorldDAO/awesome-desci) - A curated list of awesome Decentralized Science (DeSci) resources, projects, articles and more.
|
||
|
||
## Videos
|
||
|
||
- [3mdeb](https://3mdeb.com/)
|
||
- [Explaining Computers presents “Qubes OS: Security Oriented Operating System”](https://www.youtube.com/watch?v=hWDvS_Mp6gc)
|
||
- [GPU Virtual Machine (GVM) - An OpenMdev Project (Qubes OS Summit 2022)](https://www.youtube.com/watch?v=YllX-ud70Nk)
|
||
- [GPU Virtual Machine (GVM) - An OpenMdev Project (Qubes OS Summit 2022)](https://www.youtube.com/watch?v=YllX-ud70Nk)
|
||
- [Qubes OS summit 2022: Day 1](https://www.youtube.com/watch?v=hkWWz3xGqS8)
|
||
- [Qubes OS summit 2022: Day 2](https://www.youtube.com/watch?v=A9GrlQsQc7Q)
|
||
- [Qubes OS-3mdeb mini-summit 2021: Day 1](https://www.youtube.com/watch?v=y3V_V0Vllas)
|
||
- [Qubes OS-3mdeb mini-summit 2021: Day 2](https://www.youtube.com/watch?v=KdDr6TiqF0k)
|
||
- [Micah Lee presents “Qubes OS: The Operating System That Can Protect You Even If You Get Hacked”](https://livestream.com/accounts/9197973/events/8286152/videos/178431606)
|
||
- [UX Bessie](https://vimeo.com/542041258) - Qubes OS AppMenu Design Direction. Part of 2020/21 MOSS funded UX work.
|
||
- [UX Jackie](https://vimeo.com/541946756) - Qubes OS AppMenu Design Direction. Part of 2020/21 MOSS funded UX work.
|
||
|
||
## Security
|
||
|
||
- [Anonymizing your MAC Address](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/anonymizing-your-mac-address.md)
|
||
- [Anti Evil Maid (AEM)](https://www.qubes-os.org/doc/anti-evil-maid/)
|
||
- [Data leaks](https://www.qubes-os.org/doc/data-leaks/)
|
||
- [Device handling security](https://www.qubes-os.org/doc/device-handling-security/)
|
||
- [Firewall](https://www.qubes-os.org/doc/firewall/)
|
||
- [Passwordless root access in Qubes](https://www.qubes-os.org/doc/vm-sudo/)
|
||
- [Reducing the fingerprint of the text-based web browser w3m](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/w3m.md)
|
||
- [Running Tails in Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/tails.md)
|
||
- [Signal](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/signal.md)
|
||
- [Split GPG](https://www.qubes-os.org/doc/split-gpg/)
|
||
- [Split SSH](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/split-ssh.md)
|
||
- [Split dm-crypt](https://github.com/rustybird/qubes-split-dm-crypt)
|
||
- [U2F proxy](https://www.qubes-os.org/doc/u2f-proxy/)
|
||
- [Using Multi-Factor Authentication with Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/security/multifactor-authentication.md)
|
||
- [Using OnlyKey with Qubes OS](https://docs.crp.to/qubes.html)
|
||
- [Whonix for Privacy & Anonymity](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/whonix.md)
|
||
- [YubiKey](https://www.qubes-os.org/doc/yubikey/)
|
||
|
||
## Vitualization
|
||
|
||
- [Awesome-Virtualization](https://github.com/Wenzel/awesome-virtualization) - A curated list of awesome resources about virtualization.
|
||
|
||
## Kernels
|
||
|
||
- [eBPF](https://ebpf.io) - eBPF is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in an operating system kernel.
|
||
|
||
### Microkernels
|
||
|
||
- [OpenXT](https://openxt.org/) - OpenXT is an open-source development toolkit for hardware-assisted security research and appliance integration.
|
||
- [Qubes-linux-kernel](https://github.com/QubesOS/qubes-linux-kernel) - Qubes package for Linux kernel.
|
||
- [seL4](https://sel4.systems/) - seL4 is a high-assurance, high-performance operating system microkernel.
|
||
|
||
### Unikernels
|
||
|
||
- [Awesome-Unikernels](https://github.com/uniqernel/awesome-unikernels) - Secure, lightweight and high performance approach to application delivery.
|
||
- [ClickOS](http://cnp.neclab.eu/projects/clickos) - Efficient network function virtualization platform, optimized for Xen and developed by NEC.
|
||
- [Clive](http://lsub.org/ls/clive.html) - Research project from Rey Juan Carlos University (Madrid), developed in Go.
|
||
- [HaLVM](https://galois.com/project/halvm) - Port of Glasgow Haskell compiler producing Xen optimized unikernels.
|
||
- [Mini-OS](https://wiki.xen.org/wiki/Mini-OS) - Reference kernel distributed with Xen.
|
||
- [Qubes-Mirage-Firewall](https://github.com/mirage/qubes-mirage-firewall) - A unikernel that can run as a Qubes OS ProxyVM, replacing sys-firewall.
|
||
|
||
### Unikernel-like
|
||
|
||
- [Drawbridge](https://www.microsoft.com/en-us/research/project/drawbridge) - Research prototype platform from Microsoft.
|
||
- [Graphene](https://github.com/oscarlab/graphene) - Library OS optimized for Intel SGX.
|
||
|
||
## Exploitation Tools
|
||
|
||
- [American Fuzzy Lop](https://github.com/google/AFL) - Fuzzing is one of the most powerful and proven strategies for identifying security issues in real-world software
|
||
- [Awesome-Fuzzing](https://github.com/cpuu/awesome-fuzzing) - A curated list of references to awesome Fuzzing for security testing. Additionally there is a collection of freely available academic papers, tools and so on.
|
||
- [Bonzai](https://github.com/rwxrob/bonzai) - It's like a modular, multicall BusyBox builder for Go with built in completion and embedded documentation support.
|
||
- [CodeQL](https://codeql.github.com/) - Discover vulnerabilities across a codebase with CodeQL.
|
||
- [Joern](https://github.com/joernio/joern) - Joern is a platform for analyzing source code, bytecode, and binary executables. It generates code property graphs (CPGs), a graph representation of code for cross-language code analysis.
|
||
- [LeechCore](https://github.com/ufrisk/LeechCore) - The LeechCore Memory Acquisition Library focuses on Physical Memory Acquisition using various hardware and software based methods.
|
||
- [LeechCore-Plugins](https://github.com/ufrisk/LeechCore-plugins) - This repository contains various plugins for LeechCore - Physical Memory Acquisition Library.
|
||
- [Libvmi](https://libvmi.com/) - LibVMI is a C library with Python bindings that makes it easy to monitor the low-level details of a running virtual machine.
|
||
- [Memflow](https://github.com/memflow/memflow) - memflow is a library that enables introspection of various machines (hardware, virtual machines, memory dumps) in a generic fashion.
|
||
- [Capstone](https://www.capstone-engine.org/) - Capstone is a lightweight multi-platform, multi-architecture disassembly framework.
|
||
- [Coredump](https://github.com/memflow/memflow-coredump) - Access Microsoft Windows Coredump files.
|
||
- [Kvm](https://github.com/memflow/memflow-kvm) - KVM memflow connector.
|
||
- [Pcileech](https://github.com/memflow/memflow-pcileech) - Access pcileech interface.
|
||
- [Qemu_procfs](https://github.com/memflow/memflow-qemu-procfs) - Access QEMU Physical memory.
|
||
- [Unicorn](https://www.unicorn-engine.org/) - Unicorn is a lightweight multi-platform, multi-architecture CPU emulator framework.
|
||
- [MemProcFS](https://github.com/ufrisk/MemProcFS) - MemProcFS is an easy and convenient way of viewing physical memory as files in a virtual file system.
|
||
- [MemProcFS-Plugins](https://github.com/ufrisk/MemProcFS-plugins) - This repository contains various non-core plugins for MemProcFS - The Memory Process File System.
|
||
- [Microlibvmi](https://github.com/Wenzel/libmicrovmi) - A cross-platform unified Virtual Machine Introspection API library.
|
||
- [Radare2](https://github.com/radareorg/radare2) - Libre Reversing Framework for Unix Geeks.
|
||
- [Volatility3](https://github.com/volatilityfoundation/volatility3) - Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples.
|
||
|
||
## Xen Exploitation
|
||
|
||
### Video Presentations
|
||
|
||
- [Advanced Exploitation: Xen Hypervisor VM Escape](https://www.youtube.com/watch?v=6Ld5CiInrcI)
|
||
- [Attacking Hypervisors Using Firmware And Hardware](https://www.youtube.com/watch?v=nyW3eTobXAI) - [[PDF Slides]](http://c7zero.info/stuff/AttackingHypervisorsViaFirmware_bhusa15_dc23.pdf)
|
||
- [Blackhat 2010 - Hacking the Hypervisor](https://www.youtube.com/watch?v=sTC9x5hYYFo)
|
||
- [Lessons Learned from Eight Years of Breaking Hypervisors](https://www.youtube.com/watch?v=PJWJjb0uxXE) - [[Website Slides]](https://www.blackhat.com/docs/eu-14/materials/eu-14-Wojtczuk-Lessons-Learned-From-Eight-Years-Of-Breaking-Hypervisors.pdf)
|
||
- [Ouroboros: Tearing Xen Hypervisor With the Snake](https://www.youtube.com/watch?v=kt3kX94kWcM)
|
||
- [Software Attacks on Hypervisor Emulation of Hardware](https://www.youtube.com/watch?v=c4DnlP88D2Y) - [[PDF Slides]](https://www.troopers.de/downloads/troopers17/TR17_Attacking_hypervisor_through_hardwear_emulation.pdf)
|
||
- [The Arms Race Over Virtualization](https://www.youtube.com/watch?v=nWvg7NKwOjg) - [[PDF Slides]](https://www.blackhat.com/docs/us-16/materials/us-16-Luan-Ouroboros-Tearing-Xen-Hypervisor-With-The-Snake.pdf)
|
||
- [XenPwn: Breaking Paravirtualized Devices](https://www.youtube.com/watch?v=qxz8MzE3QME) - [[PDF Slide]](https://www.blackhat.com/docs/us-16/materials/us-16-Wilhelm-Xenpwn-Breaking-Paravirtualized-Devices-wp.pdf)
|
||
|
||
### PDF Papers
|
||
|
||
- [Bluepilling the Xen Hypervisor [PDF]](https://invisiblethingslab.com/resources/bh08/part3.pdf)
|
||
- [Hypervisor Vulnerability Research - State of the Art [PDF]](https://alisa.sh/slides/HypervisorVulnerabilityResearch2020.pdf)
|
||
- [Preventing and Detecting Xen Hypervisor Subversions [PDF]](https://invisiblethingslab.com/resources/bh08/part2.pdf)
|
||
- [Subverting the Xen Hypervisor [PDF]](https://invisiblethingslab.com/resources/bh08/part1.pdf)
|
||
|
||
### Web articles
|
||
|
||
- [Glitches in the Matrix – Escape via NMI](https://www.cpl0.com/blog/?p=46)
|
||
- [Xen exploitation part 1: XSA-105, from nobody to root](https://blog.quarkslab.com/xen-exploitation-part-1-xsa-105-from-nobody-to-root.html)
|
||
- [Xen exploitation part 2: XSA-148, from guest to host](https://blog.quarkslab.com/xen-exploitation-part-2-xsa-148-from-guest-to-host.html)
|
||
|
||
## VM-Hardening
|
||
|
||
- [Kicksecure](https://www.kicksecure.com/wiki/Kicksecure-Qubes_Security)
|
||
- [Qcrypt](https://github.com/3hhh/qcrypt)
|
||
- [Qubes-VM-hardening](https://github.com/tasket/Qubes-VM-hardening)
|
||
|
||
## System
|
||
|
||
- [Architecture](https://www.qubes-os.org/doc/architecture/)
|
||
- [Audio virtualization](https://www.qubes-os.org/doc/audio-virtualization/)
|
||
- [Networking](https://www.qubes-os.org/doc/networking/)
|
||
- [Qubes core admin client](https://www.qubes-os.org/doc/qubes-core-admin-client/)
|
||
- [Qubes core admin](https://www.qubes-os.org/doc/qubes-core-admin/)
|
||
- [Qubes core stack](https://www.qubes-os.org/doc/qubes-core-stack/)
|
||
- [Security design goals](https://www.qubes-os.org/doc/security-design-goals/)
|
||
- [Security-critical code](https://www.qubes-os.org/doc/security-critical-code/)
|
||
- [Storage pools](https://www.qubes-os.org/doc/storage-pools/)
|
||
- [Template implementation](https://www.qubes-os.org/doc/template-implementation/)
|
||
- [Template manager](https://www.qubes-os.org/doc/template-manager/)
|
||
|
||
## Services
|
||
|
||
- [Admin API](https://www.qubes-os.org/doc/admin-api/)
|
||
- [Dom0 secure updates](https://www.qubes-os.org/doc/dom0-secure-updates/)
|
||
- [Inter-qube file copying (qfilecopy)](https://www.qubes-os.org/doc/qfilecopy/)
|
||
- [Qrexec: Qubes RPC internals](https://www.qubes-os.org/doc/qrexec-internals/)
|
||
- [Qrexec: secure communication across domains](https://www.qubes-os.org/doc/qrexec/)
|
||
- [Qrexec: socket-based services](https://www.qubes-os.org/doc/qrexec-socket-services/)
|
||
- [Qubes memory manager (qmemman)](https://www.qubes-os.org/doc/qmemman/)
|
||
|
||
## Advanced Topics
|
||
|
||
- [Config files](https://www.qubes-os.org/doc/config-files/)
|
||
- [Disposable customization](https://www.qubes-os.org/doc/disposable-customization/)
|
||
- [How to install software in dom0](https://www.qubes-os.org/doc/how-to-install-software-in-dom0/)
|
||
- [How to make any file persistent (bind-dirs)](https://www.qubes-os.org/doc/bind-dirs/)
|
||
- [How to mount a Qubes partition from another OS](https://www.qubes-os.org/doc/mount-from-other-os/)
|
||
- [Installing contributed packages](https://www.qubes-os.org/doc/installing-contributed-packages/)
|
||
- [Managing qube kernels](https://www.qubes-os.org/doc/managing-vm-kernels/)
|
||
- [Qubes service](https://www.qubes-os.org/doc/qubes-service/)
|
||
- [RPC policies](https://www.qubes-os.org/doc/rpc-policy/)
|
||
- [Resize disk image](https://www.qubes-os.org/doc/resize-disk-image/)
|
||
- [SaltStack (management software)](https://www.qubes-os.org/doc/salt/)
|
||
- [Secondary storage](https://www.qubes-os.org/doc/secondary-storage/)
|
||
- [Standalones and HVMs](https://www.qubes-os.org/doc/standalones-and-hvms/)
|
||
- [USB Qubes](https://www.qubes-os.org/doc/usb-qubes/)
|
||
- [Volume backup and revert](https://www.qubes-os.org/doc/volume-backup-revert/)
|
||
- [Windows Qubes](https://www.qubes-os.org/doc/windows/)
|
||
|
||
## Qubes OS Legends
|
||
|
||
- [Joanna Rutkowska](https://en.wikipedia.org/wiki/Joanna_Rutkowska) - Founder of Qubes OS.
|
||
- [Blog](https://blog.invisiblethings.org/) - Personal Blog.
|
||
- [Marek Marczykowski-Górecki](https://github.com/marmarek) - Lead developer at Qubes OS.
|
||
- [Ninavizz](https://vimeo.com/user1589693) - Qubes OS UX Designer.
|
||
- [Unman](https://github.com/unman?tab=repositories)
|
||
- [Templates](https://qubes.3isec.org/Templates_4.1/)
|
||
- [Unman Install Scripts](https://github.com/unman/shaker)
|
||
- [Core Team](https://www.qubes-os.org/team/#core-team)
|
||
|
||
## Training and Materials
|
||
|
||
- [Training-materials](https://github.com/QubesOS/training-materials/) - A Collection of training materials for Qubes OS.
|
||
- [Qubes-diagrams](https://github.com/rootkovska/qubes-diagrams) - Qubes OS architecture diagrams.
|
||
- [Qubes-artwork](https://github.com/QubesOS/qubes-artwork) - This repository contains various artworks for Qubes OS.
|
||
- [pwn.college](https://pwn.college/) - pwn.college is an education platform for students (and other interested parties) to learn about, and practice, core cybersecurity concepts in a hands-on fashion.
|
||
- [Anonymous Planet](https://anonymousplanet.org) - The Hitchhiker’s Guide to Online Anonymity: the comprehensive guide for online anonymity and OpSec.
|
||
- [Anonymous Planet Onion](http://thgtoa27ujspeqxasrfvcf5aozqdczvgmwgorrmblh6jn4nino3spcqd.onion/) - For those who wish to read over the anonymous Tor network.
|
||
- [Privacy-Security-Anonymity Matrix Space](https://psa.anonymousplanet.org/) - The place to be for all topics regarding privacy, anonymity and other subjects. Rooms are click-to-join.
|
||
- [xn0px90](https://patreon.com/xn0px90) - Qubes training every second and fourth weekends of every month, from Friday to Monday, covering beginner, intermediate, and advanced levels.
|
||
|
||
## Streamers
|
||
|
||
- [Infosecstreams](https://infosecstreams.com/) - An actively maintained activity-based-autosorted list of InfoSec Streamers
|
||
- [xn0px90](https://twitch.tv/xn0px90) - Your's::Trully!::First::Full::Time::Info::Sec::Qubes::OS::Streamer!
|
||
|
||
## Companies using Qubes OS
|
||
|
||
- [Qubes Partners](https://www.qubes-os.org/partners/) - The Qubes Project relies greatly on the generous support of the organizations, companies, and individuals who have become Qubes Partners.
|
||
|
||
## Social media
|
||
|
||
The Qubes OS Project has a presence on the following social media platforms:
|
||
|
||
- [ClubHouse](https://www.clubhouse.com/house/qubes-os)
|
||
- [Discord](https://discord.gg/YMUbTt7ZRG)
|
||
- [Facebook](https://www.facebook.com/QubesOS/)
|
||
- [Forum](https://forum.qubes-os.org/)
|
||
- [LinkedIn](https://www.linkedin.com/company/qubes-os/)
|
||
- [Mastodon](https://mastodon.social/@QubesOS)
|
||
- [Matrix Discord Bridge](https://matrix.to/#/#qubes-os-discord-bridge-v2:matrix.org)
|
||
- [Matrix:Qubes OS](https://matrix.to/#/#cybersec-qubes_os:matrix.org)
|
||
- [Reddit Qubes OS](https://www.reddit.com/r/Qubes/)
|
||
- [Reddit hacking_qubes_os](https://www.reddit.com/r/hacking_qubes_os)
|
||
- [Reddit hack_with_qubes_os](https://www.reddit.com/r/hack_with_qubes_os)
|
||
- [Twitter](https://twitter.com/QubesOS)
|
||
- `#xen` channel on irc.oftc.net via traditional IRC clients.
|
||
- `#qubes` channel on irc.libera.chat via traditional IRC clients.
|
||
- `#qubes-os` channel on irc.anonops.com via traditional IRC clients.
|
||
|
||
## Contributing
|
||
|
||
Contribution guidelines can be found [here](https://github.com/xn0px90/Awesome-Qubes-OS/blob/master/CONTRIBUTING.md).
|
||
|
||
## Releases
|
||
|
||
- [Release notes](https://www.qubes-os.org/doc/releases/notes/)
|
||
- [Release schedules](https://www.qubes-os.org/doc/releases/schedules/)
|
||
- [Supported releases](https://www.qubes-os.org/doc/supported-releases/)
|
||
- [Testing new releases and updates](https://www.qubes-os.org/doc/testing/)
|
||
|
||
## Adventure Further
|
||
|
||
- Adventures start here ---> [Adventure Here!](https://github.com/sindresorhus/awesome) - All the awesome list.
|
||
**[⬆ back to top](#awesome-qubes-os-)**
|
||
|
||
## License
|
||
|
||
[![Creative Commons License](http://i.creativecommons.org/l/by/1.0/88x31.png)](https://creativecommons.org/licenses/by/1.0/)
|
||
|
||
This work is licensed under a [Creative Commons Attribution 1.0 Generic](http://creativecommons.org/licenses/by/1.0/).
|
||
|
||
:|: ADVENTURE FURTHER :|: HACK ALL THE THINGS :|: TRUST NOTHING :|: WITH <3! ~X
|