Scripts for setting up QubesOS
Go to file
2022-05-26 16:43:33 -04:00
fedora Kicksecure 2022-05-26 16:43:33 -04:00
fedora-brave Kicksecure 2022-05-26 16:43:33 -04:00
kicksecure Kicksecure 2022-05-26 16:43:33 -04:00
kicksecure-minimal sys-net 2022-05-26 15:04:02 -04:00
dom0.sh sys-net 2022-05-26 15:04:02 -04:00
LICENSE Initial commit 2022-02-03 02:57:15 -05:00
README.md kickseucre 2022-05-26 13:50:11 -04:00
whonix-hardening.sh kickseucre 2022-05-26 13:50:11 -04:00

QubesOS-Scripts

My scripts for setting up QubesOS. Read the scripts and adjust them to your needs, don't just blindly run them. Note that the scripts do not disable passwordless sudo. If you want to do it, follow https://www.qubes-os.org/doc/vm-sudo/ and set it up on the Fedora and Debian templates before using my scripts. The purpose of this is to hopefully get a bit better protection against VM escapes (as an attacker would need to both get root privilege in the VM and exploit a bug in the Qubes agents or Xen hypervisor).