<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>Track Awesome Qubes OS Updates Weekly</title>
  <id>https://www.trackawesomelist.com/xn0px90/Awesome-Qubes-OS/week/feed.xml</id>
  <updated>2024-11-19T01:59:22.408Z</updated>
  <link rel="self" type="application/atom+xml" href="https://www.trackawesomelist.com/xn0px90/Awesome-Qubes-OS/week/feed.xml"/>
  <link rel="alternate" type="application/json" href="https://www.trackawesomelist.com/xn0px90/Awesome-Qubes-OS/week/feed.json"/>
  <link rel="alternate" type="text/html" href="https://www.trackawesomelist.com/xn0px90/Awesome-Qubes-OS/week/"/>
  <generator uri="https://github.com/bcomnes/jsonfeed-to-atom#readme" version="1.2.2">jsonfeed-to-atom</generator>
  <icon>https://www.trackawesomelist.com/favicon.ico</icon>
  <logo>https://www.trackawesomelist.com/icon.png</logo>
  <subtitle>A curated list of awesome qubes os links</subtitle>
  <entry>
    <id>https://www.trackawesomelist.com/2024/47/</id>
    <title>Awesome Qubes OS Updates on Nov 18 - Nov 24, 2024</title>
    <updated>2024-11-19T01:59:22.408Z</updated>
    <published>2024-11-19T01:59:22.408Z</published>
    <content type="html"><![CDATA[<h3><p>Qubes OS Server / Unikernel-like</p>
</h3>
<ul>
<li><a href="https://github.com/Rudd-O/borg-offsite-backup" rel="noopener noreferrer">borg-offsite-backup (⭐4)</a> - help back up Qubes VMs and ZFS file systems.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2024/47/"/>
    <summary>1 awesome projects updated on Nov 18 - Nov 24, 2024</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2024/46/</id>
    <title>Awesome Qubes OS Updates on Nov 11 - Nov 17, 2024</title>
    <updated>2024-11-13T01:53:15.988Z</updated>
    <published>2024-11-12T12:55:08.150Z</published>
    <content type="html"><![CDATA[<h3><p>Qubes OS Websites</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/doc/devel-books/" rel="noopener noreferrer">Qubes OS Developer Books</a> - A list of various books that might be useful in learning some basics needed for Qubes development.</li>
</ul>
<h3><p>Downloading, Installing, Upgrading, and Building</p>
</h3>
<ul>
<li><a href="https://qubes.notset.fr/iso/" rel="noopener noreferrer">Qubes OS 4.3 Weekly Alpha Builds</a> - Qubes OS 4.3 Weekly Alpha Build download.</li>
</ul>
<h3><p>How-to guides</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/doc/qfilecopy/" rel="noopener noreferrer">Inter-qube file copying (qfilecopy)</a> - File copying with qfilecopy.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/qubes-salt-beginners-guide/20126" rel="noopener noreferrer">Qubes Salt Beginner’s Guide</a> - How to guide for beginners who enjoy an hands-on introduction with examples.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/reverse-tethering-screen-mirroring-qube-for-android-device/28920" rel="noopener noreferrer">Reverse Tethering &amp; Screen Mirroring Qube for Android Device</a> - Control your Android Device from Qubes OS while providing Network to the Android Device.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/how-to-efficiently-migrate-qubes-to-a-new-computer-with-a-direct-network-connection/23203/2" rel="noopener noreferrer">How to migrate qubes to a new computer </a> - How to efficiently migrate qubes to a new computer with a direct network connection</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/how-to-get-a-usb-mfp-printer-scanner-working-in-r4-2/24520" rel="noopener noreferrer">USB MFP printer/scanner</a> - How to get a USB MFP printer/scanner working in R4.2</li>
</ul>
<h3><p>Templates</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/manually-verifying-hashes-of-installed-files/23833" rel="noopener noreferrer">Manually Verifying Hashes of Installed Files</a> -  This guide explains how to manually verifying hashes of installed files.</li>
</ul>

<ul>
<li><a href="https://qubes.3isec.org/Templates_4.2/" rel="noopener noreferrer">Pentesting: Parrot</a> - Parrot Security is a Debian-based OS with over 600 tools for hacking, pentesting and software development. It is free, open source, secure, portable and customizable for various environments and devices</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/prestium-os-setup/22545" rel="noopener noreferrer">Prestium OS</a> - Prestium OS is a Tails OS-like live linux distro.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/android-vm-options-and-blissos-installation-in-a-raw-vm-i-e-no-qubes-integration-collecting-all-realted-information/27582" rel="noopener noreferrer">Android VM options</a> -  There are multiple “android on PC” type distributions that one could try in a VM. Here are the 3!</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/waydroid-template/23356" rel="noopener noreferrer">Waydroid template</a> - This guide is for setting up minimal Waydroid template.</li>
</ul>

<ul>
<li><a href="https://qubes.3isec.org/Templates_4.2/" rel="noopener noreferrer">Ubuntu 2022.4 minimal</a> - Ubuntu 22.04 (Jammy Jellyfish) Releasesis an open-source software platform that runs everywhere from the PC to the server and the cloud.</li>
</ul>

<ul>
<li><a href="https://qubes.3isec.org/Templates_4.2/" rel="noopener noreferrer">Ubuntu 2024.4 minimal</a> - Ubuntu 24.04.1 (Noble Numbat) ReleasesUbuntu is an open-source software platform that runs everywhere from the PC to the server and the cloud.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/install-guix-os-in-a-standalone-hvm/6209" rel="noopener noreferrer">GuixOS HVM</a> - Install Guix OS in a standalone HVM</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/running-zoom-in-a-dispvm/19062" rel="noopener noreferrer">Zoom Disp VM</a> - Running Zoom in a DispVM.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/prestium-os-setup/22545/1" rel="noopener noreferrer">PrestiumOS HVM</a> - Prestium OS is a Tails OS-like live linux distro.</li>
</ul>

<ul>
<li><a href="https://github.com/92VV3M42d3v8/PiHole/blob/master/PiHole%20Cloudflared" rel="noopener noreferrer">PiHole Cloudflared (⭐1)</a> - PiHole Cloudflared in QubesOS with NextDNS (DNS over Https).</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/templates/fedora/in-place-upgrade/#detailed-instructions-for-standard-fedora-templates" rel="noopener noreferrer">Fedora template in-place upgrade</a> - How to upgrade a Fedora template in-place.</li>
</ul>
<h3><p>VM-Hardening</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/guide-kicksecure-for-disp-sys/13324" rel="noopener noreferrer">Kicksecure for DISP-sys*</a> - How to create disposable sys-usb, sys-net, sys-firewall off a debian-11 minimal template with Kicksecure and other hardening features for DISP-sys*.</li>
</ul>

<ul>
<li><a href="https://dataswamp.org/~solene/2024-03-06-qubes-os-nat.html" rel="noopener noreferrer">Easily NAT qubes port to external network</a> - A script to ease the work of doing a NAT to expose a qube port to the physical network interface.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/install-qubes-os-with-boot-partition-and-a-detached-luks-header-on-usb/26366" rel="noopener noreferrer">Install Qubes OS with boot partition and a detached LUKS header on USB</a> - The encrypted disk will look like an unused/empty unpartitioned disk.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/set-custom-preferences-for-brave-browser-in-disposable-qube/27351" rel="noopener noreferrer">Custom preferences for Brave browser in disposable qube</a> - The initial_preferences json file can be used to configure the preferences that will be used by default in newly created profiles.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/hardening-sys-net/24345" rel="noopener noreferrer">Hardening sys-net</a> - This guide works no matter whether or not you chose disposable sys-net or not. no nonsense guide, Lets get in!</li>
</ul>

<ul>
<li><a href="https://dataswamp.org/~solene/2023-05-15-qubes-os-install-nix.html" rel="noopener noreferrer">Nix in a Qubes OS AppVM</a> - How to install Nix in an AppVm.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/disable-file-indexing-in-disposable-qubes/20747" rel="noopener noreferrer">No file indexing</a> - Disable file indexing in disposable qubes</li>
</ul>

<ul>
<li><a href="https://github.com/QubesOS/qubes-app-shutdown-idle" rel="noopener noreferrer">Qubes Shutdown Idle Script (⭐5)</a> - This is a simple script that watches the current qube for idleness and, if it's idle for more than 15 minutes (timeout time is defined in qubesidle.idleness_monitor), shuts it down.</li>
</ul>

<ul>
<li><a href="https://github.com/unman/qubes-ssh-agent" rel="noopener noreferrer">qubes-ssh-agent (⭐3)</a> - This is an alternative approach to the existing qubes split-ssh.</li>
</ul>
<h3><p>Customization</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/improve-video-playback-performance-including-youtube/21946" rel="noopener noreferrer">Playback performance</a> - This guide will show you how to install the mpv player and use it with maximum performance.</li>
</ul>

<ul>
<li><a href="https://codeberg.org/brunoschroeder/qubes-salt-video-playback" rel="noopener noreferrer">qubes-salt-video-playback</a> - Qubes SaltStack configuration of Videos Playback VM</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/sys-gui-customization-minimal-fedora-and-alternate-desktop-environments-window-managers-de-wms/27093" rel="noopener noreferrer">Sys-gui Customization</a> - Minimal Fedora and Alternate Desktop Environments / Window Managers (DE/WMs)</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/tiling-xfce-windows-with-shortcut-keys/22840" rel="noopener noreferrer">Tiling XFCE </a> - Titled windows in XFCE with shortcut keys.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/dark-theme-in-dom0/18997" rel="noopener noreferrer">Dark Theme</a> -  The following text describes how to change the default light theme to a dark theme.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/rxvt-terminal/18992" rel="noopener noreferrer">Rxvt Terminal</a> - rxvt-unicode is an advanced and efficient vt102 emulator.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/cpu-monitor-per-vms/22829" rel="noopener noreferrer">CPU monitor per VMs</a> - Individual VM monitoring.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/app-menu-shortcut-troubleshooting/" rel="noopener noreferrer">Custom App entries for the Q Menu</a> - App menu shortcut troubleshooting.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/guide-xfce-global-dark-mode-in-qubes-4-0-4-1/10757" rel="noopener noreferrer">xfce dark mode </a> - Xfce global dark mode in Qubes</li>
</ul>
<h3><p>GPU</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/create-a-gaming-hvm/19000" rel="noopener noreferrer">Gaming HVM</a>) - HVM for gaming!</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/wip-salt-automating-nvidia-gpu-passthrough/30038" rel="noopener noreferrer">Salt: automating NVIDIA GPU passthrough</a> - This “guide” aims to explore and give a practical example of leveraging SaltStack to achieve the same goal as NVIDIA GPU passthrough into Linux HVMs for CUDA applications.</li>
</ul>

<ul>
<li><a href="https://codeberg.org/brunoschroeder/qubes-salt-video-playback" rel="noopener noreferrer">Qubes SaltStack configuration of Videos Playback VM</a> - An mpv salt start step-by-step easy guide.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/improve-video-playback-performance-including-youtube-ytfzf/21946/1" rel="noopener noreferrer">Improve video playback performance including YouTube (ytfzf)</a> - This guide will show you how to install the mpv player and use it with maximum performance.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/quick-howto-gpu-passthrough-with-lots-of-ram/21156" rel="noopener noreferrer">GPU passthrough with lots of RAM</a> - GPU passthru with max RAM</li>
</ul>
<h3><p>ML, LLM &amp; AI</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/running-local-llms-with-or-without-gpu-acceleration/23283" rel="noopener noreferrer">Running local LLMs with or without GPU acceleration</a> - This guide explains how to install text-generation-webui (oobabooga) on Qubes OS.</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / OpenVPN</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/fedora-40-minimal-openvpn-qubes-4-2-six-easy-steps/27795" rel="noopener noreferrer">Fedora 40 Minimal(OpenVPN)</a> - Qubes 4.2 - Six Easy Steps!</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / VLESS</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/vless-obfuscation-vpn/20438" rel="noopener noreferrer">VLESS obfuscation VPN</a> - The protocol mimics a long-running https session of Chrome and is hard to detect by DPI systems.</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / Tor</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/functional-snowflake-proxy-in-sys-whonix-tor-control-panel-fix-full-guide/28866" rel="noopener noreferrer">Snowflake Proxy in QubesOS</a> - A Qubes-Whonix-17 Tor Control Panel snowflake proxy fix/installation guide.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/news/2019/04/17/tor-onion-services-available-again/" rel="noopener noreferrer">Qubes Tor onion services</a> -  Qubes OS Tor .onion links</li>
</ul>

<ul>
<li><a href="https://www.whonix.org/wiki/Onionizing_Repositories" rel="noopener noreferrer">Onionizing Repositories</a> - The guide explains how to configure experimental Tor onion services for APT repositories.</li>
</ul>

<ul>
<li><a href="https://www.whonix.org/wiki/Dev/Qubes_Remote_Support" rel="noopener noreferrer">QubesOS to be remotely manageable thru tor</a> - QubesOS to be remotely manageable from on-demand, ephemeral, hidden onion service to dom0/AdminVM.</li>
</ul>

<ul>
<li><a href="https://www.whonix.org/wiki/Dev/Qubes" rel="noopener noreferrer">Qubes-Whonix development notes</a> - Whonix development notes.</li>
</ul>

<ul>
<li><a href="https://www.whonix.org/wiki/DoNot#Use_Clearnet_and_Tor_at_the_Same_Time" rel="noopener noreferrer">Tips on Remaining Anonymous</a> - The wiki page provides guidelines and good habits for online privacy and security, with a focus on distinguishing between anonymity and pseudonymity.</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / Anonymity</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/localsend-file-sharing-locally-with-wifi/29939" rel="noopener noreferrer">LocalSend</a> -Free, open-source app that allows you to securely share files and messages with nearby devices over your local network without needing an internet connection. Basically, a platform neutral “airdrop”.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/tailscale-setup/19004" rel="noopener noreferrer">Tailscale Setup</a> - How to create template and install Tailscale.</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / Crypto</p>
</h3>
<ul>
<li><a href="https://ursidaecyber.com/how-to-use-trezor-on-qubes-os/" rel="noopener noreferrer">Ultimate Guide on Using Trezor on Qubes</a> - his guide explains how to use Trezor cryptocurrency hardware wallets on Qubes OS.</li>
</ul>
<h3><p>Kernels / Crypto</p>
</h3>
<ul>
<li><a href="https://github.com/rumpkernel/rumprun" rel="noopener noreferrer">Rump (⭐1.1k)</a> - Rump kernels enable you to build the software stack you need without forcing you to reinvent the wheels.</li>
</ul>
<h3><p>Kernels / Unikernels</p>
</h3>
<ul>
<li><a href="https://unikraft.org/" rel="noopener noreferrer">Unikraft</a> - Unikraft powers the next-generation of cloud native applications by enabling you to radically customize and build custom OS/kernels, unlocking best-in-class performance, security primitives and efficiency savings.</li>
</ul>

<ul>
<li><a href="https://github.com/solo-io/unik" rel="noopener noreferrer">Unik (⭐2.7k)</a> - A platform for automating unikernel &amp; MicroVM compilation and deployment.</li>
</ul>
<h3><p>Qubes OS Server / Unikernel-like</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/multi-user-qubes-using-sys-gui-to-make-non-adminstrative-user-logins/29967" rel="noopener noreferrer">Multi-user Qubes: Using sys-gui to make non-adminstrative user logins</a> - Here we try to create restricted sys-guis, where they only need to see the parts that pertain to them. Basically a administrative gui login (dom0), and a restricted user sys-gui login.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/how-to-use-the-qubes-admin-policies-api-despite-the-lack-of-documentation-wip/29863/1" rel="noopener noreferrer">Qubes Admin Policies/API</a> - The qubes admin policies are core to modern qubes.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/an-opensnitch-nodes-implementation-to-filter-outbound-traffic-from-multiple-qubes/29369" rel="noopener noreferrer"> Opensnitch Nodes</a> -A node is a daemon running on a machine. You can install the daemon on multiple machines, and manage them from the server</li>
</ul>

<ul>
<li><a href="https://codeberg.org/brunoschroeder/qubes-git-syncer" rel="noopener noreferrer">Qubes sync git repositories with dom0</a> - This solution is intended have git repos easily in sync with dom0.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/salt/" rel="noopener noreferrer">Salt (management software)</a> - Salt allows administrators to easily configure their systems.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/qubes-salt-beginners-guide/20126" rel="noopener noreferrer">Salt Beginner's Guide</a> - Guide for beginners who enjoy an hands-on introduction with examples.</li>
</ul>

<ul>
<li><a href="https://github.com/QubesOS/qubes-mgmt-salt-dom0-qvm#readme" rel="noopener noreferrer">qubes-mgmt-salt-dom0-qvm (⭐15)</a> - Salt can manage many Qubes settings via the qvm state module.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/salt/#virtual-machine-formulae" rel="noopener noreferrer">Virtual Machine Formulae</a> - Salt allows administrators to easily configure their systems. In this guide we will show how it is set up and how you can modify it for your own purpose.</li>
</ul>

<ul>
<li><a href="https://docs.gonzalobulnes.com/configuration_management.html" rel="noopener noreferrer">Configuration Management</a> - A collection of guides about creating Salt formulas in Qubes OS and distributing them as RPM packages to take advantage of the secure updates mechanism for dom0.</li>
</ul>

<ul>
<li><a href="https://docs.saltproject.io/en/latest/contents.html" rel="noopener noreferrer">Offcial Salt Documentation</a> - Salt is an event-driven automation tool and framework to deploy, configure, and manage complex IT systems.</li>
</ul>

<ul>
<li><a href="https://docs.saltproject.io/salt/user-guide/en/latest/index.html" rel="noopener noreferrer">Official Salt User Guide</a> - Salt user guide</li>
</ul>

<ul>
<li><a href="https://github.com/ben-grande/qusal" rel="noopener noreferrer">qusal (⭐27)</a> - Salt Formulas for Qubes OS.</li>
</ul>

<ul>
<li><a href="https://dev.qubes-os.org/projects/core-admin-client/en/latest/manpages/qvm-firewall.html" rel="noopener noreferrer">qvm-firewall</a> - Manage VM outbound firewall.</li>
</ul>

<ul>
<li><a href="https://dev.qubes-os.org/projects/core-admin-client/en/latest/py-modindex.html" rel="noopener noreferrer">Qubes Admin python modules</a> - Python Module Index</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/simple-qubes-os-qubes-network-display/26031" rel="noopener noreferrer">Qubes network dom0 display</a> - a simple script to run in dom0 (easy to audit) that will output a hierarchy tree of netvm and their qubes.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/colored-network-information-iptables-routes-addresses-shell-reporting-networking/22258/1" rel="noopener noreferrer">Colored! network information</a> - Colorful network information with iptables &amp; ip.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/visualize-qubes-configuration-without-trust-a-use-case-for-the-qubes-admin-api/23072" rel="noopener noreferrer">Visualize Qubes Configuration Without Trust</a> - Visualize Qubes Configuration with the Qubes Admin API.</li>
</ul>

<ul>
<li><a href="https://www.whonix.org/wiki/Remote_Administration#Qubes_-_SSH_or_VNC_into_Qubes_dom0" rel="noopener noreferrer">SSH or VNC into Qubes dom0</a> - tutorial on how to SSH or VNC in to dom0</li>
</ul>

<ul>
<li><a href="https://github.com/QubesOS/qubes-remote-support" rel="noopener noreferrer">qubes-remote-support-receiver dom0 scripts (⭐4)</a> - Scripts to configure dom0 to allow remote connections.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/remote-qubes-user-testing-running-qubes-in-the-browser/13817" rel="noopener noreferrer">Web VNC</a> - Running Qubes in the Browser</li>
</ul>

<ul>
<li><a href="https://github.com/QubesOS-contrib/qubes-remote-desktop" rel="noopener noreferrer">VNC (⭐9)</a> - SystemD services for creating VNC server session in dom0 or any qube.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/software-raid-mdadm-qubes-installation-procedure-wip/27886" rel="noopener noreferrer">Software RAID (mdadm) Qubes Installation Procedure</a> - CLI &amp; Software Raid installation procedure.</li>
</ul>
<h3><p>Exploitation Tools / Unikernel-like</p>
</h3>
<ul>
<li><a href="https://github.com/ClaraCrazy/qubes-docs/blob/main/sys-mitm.md" rel="noopener noreferrer">sys-mitm (⭐40)</a> - A man-in-the-middle Qube for your traffic analysis needs.</li>
</ul>
<h3><p>Optics and Extra Info / Qubes OS Summit - 3mdeb Summit videos</p>
</h3>
<ul>
<li><a href="https://youtu.be/lJFxtdan9qY?list=PLuISieMwVBpJmIaHgyv7yKDwrHpqym9Qh" rel="noopener noreferrer">Qubes OS Summit 2024</a> - Day 1</li>
</ul>

<ul>
<li><a href="https://youtu.be/9AkBeBwxdA0?list=PLuISieMwVBpL5S7kPUHKenoFj_YJ8Y0_d" rel="noopener noreferrer">Qubes OS Summit 2024</a> - Day 2</li>
</ul>
<h3><p>Optics and Extra Info / Xen project summit 2024 videos</p>
</h3>
<ul>
<li><a href="https://youtu.be/FrKEUVB-BYM?list=PLQMQQsKgvLntZiKoELFs22Mtk-tBNNOMJ" rel="noopener noreferrer">Demi Marie Obenour: Reasonably Secure GPU Acceleration</a></li>
</ul>

<ul>
<li><a href="https://youtu.be/4UUEt4rll6U?list=PLQMQQsKgvLntZiKoELFs22Mtk-tBNNOMJ" rel="noopener noreferrer">Marek Marczykowski-Górecki: Host and Guest Suspend Under Xen - S3 and S0ix</a></li>
</ul>

<ul>
<li><a href="https://youtu.be/3Lg5iTmXl-I?list=PLQMQQsKgvLntZiKoELFs22Mtk-tBNNOMJ" rel="noopener noreferrer">Marek Marczykowski-Górecki: Linux Stubdomains Status Update</a></li>
</ul>

<ul>
<li><a href="https://www.youtube.com/playlist?list=PLQMQQsKgvLntZiKoELFs22Mtk-tBNNOMJ" rel="noopener noreferrer">Full xen project summit 2024 playlist</a></li>
</ul>
<h3><p>Optics and Extra Info / UX - User Experience</p>
</h3>
<ul>
<li><a href="https://vimeo.com/541946756" rel="noopener noreferrer">UX Jackie</a> - Qubes OS AppMenu Design Direction. Part of 2020/21 MOSS funded UX work.</li>
</ul>
<h3><p>Optics and Extra Info / Extra Info</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/backups-in-qubes-video/23234" rel="noopener noreferrer">Backups in Qubes</a> - Learn how and why to back up your data on Qubes OS.</li>
</ul>
<h3><p>Training and Materials / Extra Info</p>
</h3>
<ul>
<li><a href="https://www.anarsec.guide/posts/qubes/" rel="noopener noreferrer">Qubes OS for Anarchists</a> - Qubes OS for Anarchists | Guide &amp; Best Practices</li>
</ul>

<ul>
<li><a href="https://www.infoq.com/news/2024/05/the-guardian-quebes-os/?ref=dailydev" rel="noopener noreferrer">The Guardian's Deep Dive into Qubes OS: a Secure Solution for Whistleblowing and Journalism</a> - The Guardian's engineering team recently shared their experience with Qubes OS, a security-focused desktop operating system.</li>
</ul>

<ul>
<li><a href="https://ebookfoundation.github.io/" rel="noopener noreferrer">Free e-book Foundation</a> - Free ebooks to help your journey!</li>
</ul>
<h3><p>Social media / Extra Info</p>
</h3>
<ul>
<li><a href="http://g66ol3eb5ujdckzqqfmjsbpdjufmjd5nsgdipvxmsh7rckzlhywlzlqd.onion/d/Qubes" rel="noopener noreferrer">Dread</a> - Dark Net QubesOS .onion forum room.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2024/46/"/>
    <summary>92 awesome projects updated on Nov 11 - Nov 17, 2024</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2024/44/</id>
    <title>Awesome Qubes OS Updates on Oct 28 - Nov 03, 2024</title>
    <updated>2024-10-30T01:55:53.839Z</updated>
    <published>2024-10-30T01:55:53.839Z</published>
    <content type="html"><![CDATA[<h3><p>Clearnet &amp; Anonymous Networking / Crypto</p>
</h3>
<ul>
<li><a href="https://www.getmonero.org/resources/user-guides/cli_wallet_daemon_isolation_qubes_whonix.html" rel="noopener noreferrer">Split Monero Wallet</a> - With Qubes + Whonix you can have a Monero wallet that is without networking and running on a virtually isolated system from the Monero daemon which has all of its traffic forced over Tor.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2024/44/"/>
    <summary>1 awesome projects updated on Oct 28 - Nov 03, 2024</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2024/42/</id>
    <title>Awesome Qubes OS Updates on Oct 14 - Oct 20, 2024</title>
    <updated>2024-10-20T12:47:50.829Z</updated>
    <published>2024-10-20T12:47:50.827Z</published>
    <content type="html"><![CDATA[<h3><p>Downloading, Installing, Upgrading, and Building</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/downloads/" rel="noopener noreferrer">Qubes OS 4.2.3</a> - Qubes OS 4.2.3 download.</li>
</ul>

<ul>
<li><a href="https://qubes.notset.fr/iso/" rel="noopener noreferrer">Qubes OS 4.2.3 Weekly Builds</a> - Qubes OS 4.2.3 Weekly Build download.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2024/42/"/>
    <summary>2 awesome projects updated on Oct 14 - Oct 20, 2024</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2024/28/</id>
    <title>Awesome Qubes OS Updates on Jul 08 - Jul 14, 2024</title>
    <updated>2024-07-12T01:38:19.647Z</updated>
    <published>2024-07-12T01:38:19.640Z</published>
    <content type="html"><![CDATA[<h3><p>Clearnet &amp; Anonymous Networking / OpenVPN</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/configuring-a-proxyvm-vpn-gateway/19061" rel="noopener noreferrer">How To make a VPN Gateway in Qubes</a> - Qubes includes a number of tools that can make the client-side setup of your VPN more versatile and secure.</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / Anonymity</p>
</h3>
<ul>
<li><a href="https://privsec.dev/posts/qubes/using-lokinet-on-qubes-os" rel="noopener noreferrer">Lokinet</a> - Lokinet is the reference implementation of LLARP (low latency anonymous routing protocol), a layer 3 onion routing protocol.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2024/28/"/>
    <summary>2 awesome projects updated on Jul 08 - Jul 14, 2024</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/52/</id>
    <title>Awesome Qubes OS Updates on Dec 25 - Dec 31, 2023</title>
    <updated>2023-12-26T23:14:31.648Z</updated>
    <published>2023-12-26T23:14:31.469Z</published>
    <content type="html"><![CDATA[<h3><p>Templates</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/kali-template-available/1706" rel="noopener noreferrer">Pentesting: Kali</a> - How to create a Kali Linux VM.</li>
</ul>
<h3><p>Qubes OS Legends / Extra Info</p>
</h3>
<ul>
<li><a href="https://github.com/claracrazy/qubes-docs" rel="noopener noreferrer">ClaraCrazy (⭐40)</a> - Qubes Guru &amp; Just amazing!.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/52/"/>
    <summary>2 awesome projects updated on Dec 25 - Dec 31, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/48/</id>
    <title>Awesome Qubes OS Updates on Nov 27 - Dec 03, 2023</title>
    <updated>2023-12-01T01:39:39.167Z</updated>
    <published>2023-11-30T12:40:01.688Z</published>
    <content type="html"><![CDATA[<h3><p>Templates</p>
</h3>
<ul>
<li><a href="https://svensemmler.org/notes/deb-min-templates" rel="noopener noreferrer">Auto Minimal Debian Template Creation</a> - This page summarizes how to automate debian-minimal based template creation.</li>
</ul>
<h3><p>Qubes OS Server / Unikernel-like</p>
</h3>
<ul>
<li><a href="https://gist.github.com/fepitre/941d7161ae1150d90e15f778027e3248" rel="noopener noreferrer">Port forwarding</a> - Qubes-os port forwarding to allow external connections</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/48/"/>
    <summary>2 awesome projects updated on Nov 27 - Dec 03, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/47/</id>
    <title>Awesome Qubes OS Updates on Nov 20 - Nov 26, 2023</title>
    <updated>2023-11-21T12:41:33.383Z</updated>
    <published>2023-11-20T01:32:54.591Z</published>
    <content type="html"><![CDATA[<h3><p>Templates</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/audio-qube/20685" rel="noopener noreferrer">audio-qubes</a> - An audio qube acts as a secure handler for potentially malicious audio devices, preventing them from coming into contact with dom0</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/blackarch-templatevm/19010" rel="noopener noreferrer">Pentesting: BlackArch</a> - BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/penetration-testers-framework-ptf-templatevm/19011" rel="noopener noreferrer">Pentesting: PTF</a> - "The PenTesters Framework (PTF) is a Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/47/"/>
    <summary>3 awesome projects updated on Nov 20 - Nov 26, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/46/</id>
    <title>Awesome Qubes OS Updates on Nov 13 - Nov 19, 2023</title>
    <updated>2023-11-19T01:37:00.169Z</updated>
    <published>2023-11-14T01:24:12.979Z</published>
    <content type="html"><![CDATA[<h3><p>Templates</p>
</h3>
<ul>
<li><a href="https://github.com/ElliotKillick/qvm-create-windows-qube" rel="noopener noreferrer">Qvm-Create-Windows-Qube (⭐354)</a> - Qvm-Create-Windows-Qube is a tool for quickly and conveniently installing fresh new Windows qubes with Qubes Windows Tools (QWT) drivers automatically.</li>
</ul>
<h3><p>Customization</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/docs?topic=13304" rel="noopener noreferrer">Bash completion</a> - How to install bash completion for Qubes OS commands.</li>
</ul>

<ul>
<li><a href="https://github.com/Willy-JL/Qubes-Scripts" rel="noopener noreferrer">Qubes-Scripts (⭐16)</a> - Collection of custom scripts for Qubes OS.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/46/"/>
    <summary>3 awesome projects updated on Nov 13 - Nov 19, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/45/</id>
    <title>Awesome Qubes OS Updates on Nov 06 - Nov 12, 2023</title>
    <updated>2023-11-11T02:19:00.512Z</updated>
    <published>2023-11-08T01:24:33.578Z</published>
    <content type="html"><![CDATA[<h3><p>How-to guides</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/resize-dom0/10886" rel="noopener noreferrer">How to resize dom0</a> - Just in case anyone needs help with this to resize dom0 from 20G to 50G.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/opening-urls-files-in-other-qubes/19026" rel="noopener noreferrer">How to open Urls in other qube</a> - This page is about opening URLs and files from one qube in a different qube.</li>
</ul>
<h3><p>Templates</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/archlinux-minimal-template/19052" rel="noopener noreferrer">archlinux-minimal template</a> - This is a community guide, not an official guide.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/docs?topic=18972" rel="noopener noreferrer">Building a TemplateVM for a new OS</a> - If you don’t like using one of the existing templates because of specific administration, package management or other building needs, you can build a TemplateVM for your distribution of choice.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/netbsd-qube/19009" rel="noopener noreferrer">NetBSD templates</a> - Createa NetBSD template</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/docs?topic=19008" rel="noopener noreferrer">Linux HVMs</a> - Fixing Linux distro HVMs</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/configuring-a-multimedia-templatevm/19055" rel="noopener noreferrer">Multimedia template</a> - Configuring a “Multimedia” TemplateVM</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/windows/" rel="noopener noreferrer">Windows Qubes</a> - Like any other unmodified OSes, Windows can be installed in Qubes as an HVM domain.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/docs?topic=19012" rel="noopener noreferrer">Tails OS</a> - Tails stands for The Amnesic Incognito Live System. It is a live operating system that aims to preserve your privacy and anonymit.</li>
</ul>

<ul>
<li><a href="https://github.com/kennethrrosen/qubes-shadow-dvm" rel="noopener noreferrer">Shadow qube (⭐7)</a> - The below script will create a Qube, launch the Tor browser, wait for the browser to close, then remove the qube and its RAM pool.</li>
</ul>
<h3><p>VM-Hardening</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/doc/dom0-secure-updates/" rel="noopener noreferrer">Dom0 secure updates</a> - Updating dom0</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/qubes-os-4-2-nftables-nft-firewall-guide/20933" rel="noopener noreferrer">nft Firewall</a> - This is an example for a TCP redirection, for UDP you would have to replace tcp by udp.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/signal-messenger/19073" rel="noopener noreferrer">Signal</a> - It uses end-to-end encryption to secure all communications.</li>
</ul>

<ul>
<li><a href="https://deniszanin.com/using-split-ssh-gpg-in-qubes-os" rel="noopener noreferrer">Split SSH</a> - Split SSH implements a concept similar to having a smart card with your private SSH keys, except that the role of the “smart card” is played by another Qubes AppVM.</li>
</ul>
<h3><p>Customization</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/dpi-scaling/19064" rel="noopener noreferrer">DPI scaling</a> - Qubes OS passes on dom0’s screen resolution to VMs (this can be seen in the output of xrandr) but doesn’t pass on dom0’s dpi value.</li>
</ul>

<ul>
<li><a href="https://github.com/DemiMarie/qubes-wayland" rel="noopener noreferrer">Wayland agent (⭐19)</a> - This is a GUI agent for Qubes OS that supports the [Wayland] display server protocol. Compared to X11, Wayland is vastly simpler and aims to ensure every frame is perfect.</li>
</ul>
<h3><p>Troubleshooting</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/mounting-a-qubes-private-storage-in-another-qube/19080" rel="noopener noreferrer">Mounting a qube’s private storage in another qube</a> -  Useful for data recovery.</li>
</ul>

<ul>
<li><a href="https://zrubi.hu/en/2017/traffic-analysis-qubes/" rel="noopener noreferrer">Traffic Analysis in Qubes OS</a> - You can place a ProxyVM between your AppVMs and Your NetVM. This way we can create an ideal topology for traffic analysis.</li>
</ul>

<ul>
<li><a href="https://github.com/3hhh/qubes-performance" rel="noopener noreferrer">Analyze Qubes OS VM  (⭐1)</a> - Analyze Qubes OS VM startup performance.</li>
</ul>

<ul>
<li><a href="https://github.com/raffaeleflorio/qubes-url-redirector/" rel="noopener noreferrer">Url redirector (⭐35)</a> - This is a browser extension, aimed to improve surfing security.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/changing-your-time-zone/18983" rel="noopener noreferrer">Changing your Time Zone</a> - Change the system’s time zone in terminal you can issue the timedatectl command with the option set-timezone.</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / Wireguard</p>
</h3>
<ul>
<li><a href="https://mullvad.net/en/help/wireguard-on-qubes-os/" rel="noopener noreferrer">Mullvad VPN (Fedora38 + WG)</a> - Privacy-first VPN provider's guide for Qubes OS. This guide bears an optimal method for setting up a WG ProxyVM (i.e <code>sys-vpn</code>); you may substitute out Mullvad's WG configuration files in place of your own.</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/wireguard-vpn-setup/19141" rel="noopener noreferrer">Wireguard setup</a> - This guide assumes you are using a VPN service that has wireguard support.</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / OpenVPN</p>
</h3>
<ul>
<li><a href="https://mullvad.net/en/help/qubes-os-4-and-mullvad-vpn/" rel="noopener noreferrer">Mullvad VPN (Dedian 12 + OVPN)</a> - Privacy-first VPN provider's guide for Qubes OS.</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / Anonymity</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/really-disposable-ram-based-qubes/21532" rel="noopener noreferrer">Really disposable ram based qubes</a> - You can use your QubesOS 𝚜𝚝𝚊𝚝𝚎𝚕𝚎𝚜𝚜 just like TailsOS, with persistent storage for VMs. That is pretty simple! It takes 6Gb of extra 𝚁𝙰𝙼 (for store root filesystem files).</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/how-to-bypass-the-gfw-on-qubes-os-when-youre-in-china-qubes-os/14957" rel="noopener noreferrer">How to bypass the GFW on Qubes OS when you’re in China</a> - The purpose of this article is to provide several feasible ways to bypass the GFW for you to choose.</li>
</ul>
<h3><p>Exploitation Tools / Unikernel-like</p>
</h3>
<ul>
<li><a href="https://github.com/HyperDbg/HyperDbg" rel="noopener noreferrer">Hyperdbg (⭐3.2k)</a> - HyperDbg Debugger is an open-source, community-driven, hypervisor-assisted, user-mode, and kernel-mode Windows debugger with a focus on using modern hardware technologies. It is a debugger designed for analyzing, fuzzing, and reversing.</li>
</ul>
<h3><p>Optics and Extra Info / Extra Info</p>
</h3>
<ul>
<li><a href="https://github.com/SinaKarvandi/Hypervisor-From-Scratch" rel="noopener noreferrer">Hipervisor From Scratch (⭐2.3k)</a>- Source code of a multiple series of tutorials about the hypervisor.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/45/"/>
    <summary>28 awesome projects updated on Nov 06 - Nov 12, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/44/</id>
    <title>Awesome Qubes OS Updates on Oct 30 - Nov 05, 2023</title>
    <updated>2023-11-05T01:34:00.827Z</updated>
    <published>2023-11-05T01:34:00.827Z</published>
    <content type="html"><![CDATA[<h3><p>Optics and Extra Info / Qubes OS Summit - 3mdeb Summit videos</p>
</h3>
<ul>
<li><a href="https://www.youtube.com/watch?v=xo2BVTn7ohs" rel="noopener noreferrer">Qubes OS Summit 2023</a> - Day 2</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/44/"/>
    <summary>1 awesome projects updated on Oct 30 - Nov 05, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/42/</id>
    <title>Awesome Qubes OS Updates on Oct 16 - Oct 22, 2023</title>
    <updated>2023-10-21T12:36:24.302Z</updated>
    <published>2023-10-21T12:36:24.302Z</published>
    <content type="html"><![CDATA[<h3><p>Clearnet &amp; Anonymous Networking / DNS</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/guide-how-to-setup-a-sys-dns-qube/13749" rel="noopener noreferrer">dnscrypt-proxy</a> -  Run dnscrypt-proxy inside of sys-net to encrypt and secure dns-requests.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/42/"/>
    <summary>1 awesome projects updated on Oct 16 - Oct 22, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/40/</id>
    <title>Awesome Qubes OS Updates on Oct 02 - Oct 08, 2023</title>
    <updated>2023-10-07T12:36:01.982Z</updated>
    <published>2023-10-07T12:36:01.982Z</published>
    <content type="html"><![CDATA[<h3><p>Optics and Extra Info / Qubes OS Summit - 3mdeb Summit videos</p>
</h3>
<ul>
<li><a href="https://www.youtube.com/watch?v=_UxndcxIngw" rel="noopener noreferrer">Qubes OS Summit 2023</a> - Day 1</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/40/"/>
    <summary>1 awesome projects updated on Oct 02 - Oct 08, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/15/</id>
    <title>Awesome Qubes OS Updates on Apr 10 - Apr 16, 2023</title>
    <updated>2023-04-15T12:38:43.933Z</updated>
    <published>2023-04-15T12:38:43.795Z</published>
    <content type="html"><![CDATA[<h3><p>How-to guides</p>
</h3>
<ul>
<li><a href="https://github.com/kennethrrosen/qubes-boot-verification" rel="noopener noreferrer">How to Implement TPM Boot Verification</a> - Verify and validate boot process using PCR without Heads or AEM on systems using TPM 2.0</li>
</ul>
<h3><p>Customization</p>
</h3>
<ul>
<li><a href="https://github.com/kennethrrosen/Qubes-OS-Autostart-Menu/" rel="noopener noreferrer">QubesOS Autostart Menu (⭐0)</a> - Speed up system boot process with a custom launch script</li>
</ul>

<ul>
<li><a href="https://github.com/kennethrrosen/qubes_VPN_notifier" rel="noopener noreferrer">sys-VPN notification setup</a> - Get VPN stats as a desktop notification</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/15/"/>
    <summary>3 awesome projects updated on Apr 10 - Apr 16, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/10/</id>
    <title>Awesome Qubes OS Updates on Mar 06 - Mar 12, 2023</title>
    <updated>2023-03-06T01:58:59.477Z</updated>
    <published>2023-03-06T01:58:59.474Z</published>
    <content type="html"><![CDATA[<h3><p>How-to guides</p>
</h3>
<ul>
<li><a href="https://github.com/kennethrrosen/tailscale_QubesOS" rel="noopener noreferrer">How to persist Tailscale tunnel in QubesOS  (⭐2)</a> - Tailscale is a mesh private network that lets you easily manage access to private resources or quickly SSH into devices on your network.</li>
</ul>

<ul>
<li><a href="https://github.com/kennethrrosen/journoSEC" rel="noopener noreferrer">How to use Qubes for journalists and Humans Rights Defenders (⭐19)</a> - A suite of tools for improving and streamlining the use of Qubes OS for reporters, edtiors, lawyers and aid workers. Work in progress.<ul>
<li><a href="https://github.com/kennethrrosen/qubes-PAM-distress-login/" rel="noopener noreferrer">PAM distress login for xscreensaver</a> - A simple setup for sending a distress email if forced to login to desktop beyond LUKS passwords.</li>
<li><a href="https://github.com/kennethrrosen/journoSEC/tree/main/mozilla/arkenfox" rel="noopener noreferrer">Automated Arkenfox Qubes browser install (⭐19)</a> - Arkenfox config install for journalists</li>
</ul>
</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/10/"/>
    <summary>2 awesome projects updated on Mar 06 - Mar 12, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/6/</id>
    <title>Awesome Qubes OS Updates on Feb 06 - Feb 12, 2023</title>
    <updated>2023-02-11T12:41:25.265Z</updated>
    <published>2023-02-09T01:54:34.141Z</published>
    <content type="html"><![CDATA[<h3><p>Exploitation Tools / Unikernel-like</p>
</h3>
<ul>
<li><a href="https://github.com/AFLplusplus/AFLplusplus" rel="noopener noreferrer">AFL++ (⭐5.7k)</a> - AFL++ is a superior fork to Google's AFL - more speed, more and better mutations, more and better instrumentation, custom module support, etc.</li>
</ul>

<ul>
<li><a href="https://www.capstone-engine.org/" rel="noopener noreferrer">Capstone</a> - Capstone is a lightweight multi-platform, multi-architecture disassembly framework.</li>
</ul>

<ul>
<li><a href="https://github.com/memflow/memflow-coredump" rel="noopener noreferrer">Coredump (⭐7)</a> - Access Microsoft Windows Coredump files.</li>
</ul>

<ul>
<li><a href="https://github.com/memflow/memflow-kvm" rel="noopener noreferrer">Kvm (⭐40)</a> - KVM memflow connector.</li>
</ul>

<ul>
<li><a href="https://github.com/memflow/memflow-pcileech" rel="noopener noreferrer">Pcileech (⭐24)</a> - Access pcileech interface.</li>
</ul>

<ul>
<li><a href="https://github.com/memflow/memflow-qemu-procfs" rel="noopener noreferrer">Qemu_procfs (⭐40)</a> - Access QEMU Physical memory.</li>
</ul>

<ul>
<li><a href="https://www.unicorn-engine.org/" rel="noopener noreferrer">Unicorn</a> - Unicorn is a lightweight multi-platform, multi-architecture CPU emulator framework.</li>
</ul>
<h3><p>Exploitation Tools / Xen Exploitation</p>
</h3>
<ul>
<li><a href="https://www.youtube.com/watch?v=sTC9x5hYYFo" rel="noopener noreferrer">Blackhat 2010 </a> - Hacking the Hypervisor</li>
</ul>

<ul>
<li><a href="https://www.youtube.com/watch?v=PJWJjb0uxXE" rel="noopener noreferrer">Blackhat 2014</a> - <a href="https://www.blackhat.com/docs/eu-14/materials/eu-14-Wojtczuk-Lessons-Learned-From-Eight-Years-Of-Breaking-Hypervisors.pdf" rel="noopener noreferrer">[Website Slides]</a> - Lessons Learned from Eight Years of Breaking Hypervisors</li>
</ul>

<ul>
<li><a href="https://www.youtube.com/watch?v=nyW3eTobXAI" rel="noopener noreferrer">Blackhat 2015</a> - <a href="http://c7zero.info/stuff/AttackingHypervisorsViaFirmware_bhusa15_dc23.pdf" rel="noopener noreferrer">[PDF Slides]</a> - Attacking Hypervisors Using Firmware And Hardware</li>
</ul>

<ul>
<li><a href="https://www.youtube.com/watch?v=kt3kX94kWcM" rel="noopener noreferrer">Ouroboros</a> - Tearing Xen Hypervisor With the Snake</li>
</ul>

<ul>
<li><a href="https://www.youtube.com/watch?v=qxz8MzE3QME" rel="noopener noreferrer">XenPwn</a> - <a href="https://www.blackhat.com/docs/us-16/materials/us-16-Wilhelm-Xenpwn-Breaking-Paravirtualized-Devices-wp.pdf" rel="noopener noreferrer">[PDF Slide]</a> - Breaking Paravirtualized Devices</li>
</ul>
<h3><p>Exploitation Tools / Web articles</p>
</h3>
<ul>
<li><a href="https://blog.quarkslab.com/xen-exploitation-part-1-xsa-105-from-nobody-to-root.html" rel="noopener noreferrer">Xen exploitation part 1: XSA-105</a> - From nobody to root</li>
</ul>

<ul>
<li><a href="https://blog.quarkslab.com/xen-exploitation-part-2-xsa-148-from-guest-to-host.html" rel="noopener noreferrer">Xen exploitation part 2: XSA-148</a> - From guest to host</li>
</ul>
<h3><p>Optics and Extra Info / Qubes OS Summit - 3mdeb Summit videos</p>
</h3>
<ul>
<li><a href="https://www.youtube.com/watch?v=hkWWz3xGqS8" rel="noopener noreferrer">Qubes OS summit 2022</a> - Day 1</li>
</ul>

<ul>
<li><a href="https://www.youtube.com/watch?v=A9GrlQsQc7Q" rel="noopener noreferrer">Qubes OS summit 2022</a> - Day 2</li>
</ul>

<ul>
<li><a href="https://www.youtube.com/watch?v=y3V_V0Vllas" rel="noopener noreferrer">Qubes OS-3mdeb mini-summit 2021</a> - Day 1</li>
</ul>

<ul>
<li><a href="https://www.youtube.com/watch?v=KdDr6TiqF0k" rel="noopener noreferrer">Qubes OS-3mdeb mini-summit 2021</a> - Day 2</li>
</ul>
<h3><p>Optics and Extra Info / Extra Info</p>
</h3>
<ul>
<li><a href="https://www.youtube.com/watch?v=YllX-ud70Nk" rel="noopener noreferrer">GPU Virtual Machine (GVM)</a>  - An OpenMdev Project (Qubes OS Summit 2022)</li>
</ul>

<ul>
<li><a href="https://livestream.com/accounts/9197973/events/8286152/videos/178431606" rel="noopener noreferrer">Micah Lee presents</a> - “Qubes OS: The Operating System That Can Protect You Even If You Get Hacked”</li>
</ul>

<ul>
<li><a href="https://www.youtube.com/watch?v=hWDvS_Mp6gc" rel="noopener noreferrer">Explaining Computers presents</a> - “Qubes OS: Security Oriented Operating System”</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/6/"/>
    <summary>21 awesome projects updated on Feb 06 - Feb 12, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/5/</id>
    <title>Awesome Qubes OS Updates on Jan 30 - Feb 05, 2023</title>
    <updated>2023-02-04T01:48:21.696Z</updated>
    <published>2023-02-03T01:55:15.261Z</published>
    <content type="html"><![CDATA[<h3><p>VM-Hardening</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/doc/qrexec-internals/" rel="noopener noreferrer">Qrexec: Qubes RPC internals</a> - The qrexec framework consists of a number of processes communicating with each other using a common IPC protocol, described in detail below.</li>
</ul>

<ul>
<li><a href="https://theupdateframework.io/security/" rel="noopener noreferrer">TUFF</a> - We can think of a software update system as “secure” if:</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / Anonymity</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/temporary-way-to-run-i2p-on-qubes-whonix/15861" rel="noopener noreferrer">i2p-Whonix</a> - Temporary way to run i2p on Qubes-Whonix.</li>
</ul>
<h3><p>Exploitation Tools / Xen Exploitation</p>
</h3>
<ul>
<li><a href="https://www.youtube.com/watch?v=6Ld5CiInrcI" rel="noopener noreferrer">Advanced Exploitation</a> - Xen Hypervisor VM Escape</li>
</ul>

<ul>
<li><a href="https://alisa.sh/slides/HypervisorVulnerabilityResearch2020.pdf" rel="noopener noreferrer">Hypervisor Vulnerability Research [PDF]</a> - State of the Art</li>
</ul>
<h3><p>Exploitation Tools / Web articles</p>
</h3>
<ul>
<li><a href="https://www.cpl0.com/blog/?p=46" rel="noopener noreferrer">Glitches in the Matrix</a> - Escape via NMI</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/5/"/>
    <summary>6 awesome projects updated on Jan 30 - Feb 05, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/4/</id>
    <title>Awesome Qubes OS Updates on Jan 23 - Jan 29, 2023</title>
    <updated>2023-01-28T01:52:35.599Z</updated>
    <published>2023-01-28T01:52:35.599Z</published>
    <content type="html"><![CDATA[<h3><p>Exploitation Tools / Unikernel-like</p>
</h3>
<ul>
<li><a href="https://lldb.llvm.org/" rel="noopener noreferrer">Lldb</a> - LLDB is a next generation, high-performance debugger.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/4/"/>
    <summary>1 awesome projects updated on Jan 23 - Jan 29, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/3/</id>
    <title>Awesome Qubes OS Updates on Jan 16 - Jan 22, 2023</title>
    <updated>2023-01-22T12:40:06.515Z</updated>
    <published>2023-01-22T12:40:06.515Z</published>
    <content type="html"><![CDATA[<h3><p>Training and Materials / Extra Info</p>
</h3>
<ul>
<li><a href="https://github.com/trimstray/the-book-of-secret-knowledge" rel="noopener noreferrer">The Book of Secret Knowledge (⭐168k)</a> - A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools, and more.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/3/"/>
    <summary>1 awesome projects updated on Jan 16 - Jan 22, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/3/</id>
    <title>Awesome Qubes OS Updates on Jan 16 - Jan 22, 2023</title>
    <updated>2023-01-21T01:48:18.980Z</updated>
    <published>2023-01-20T01:52:58.673Z</published>
    <content type="html"><![CDATA[<h3><p>Templates</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/doc/usb-qubes/" rel="noopener noreferrer">USB Qubes</a> - A USB qube acts as a secure handler for potentially malicious USB devices, preventing them from coming into contact with dom0 (which could otherwise be fatal to the security of the whole system). I</li>
</ul>
<h3><p>VM-Hardening</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/doc/anti-evil-maid/" rel="noopener noreferrer">Anti Evil Maid (AEM)</a> - A user who frequently travels with a Qubes laptop holding sensitive data may be at a much higher risk of Evil Maid attacks than a home user with a stationary Qubes desktop.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/salt/" rel="noopener noreferrer">SaltStack (management software)</a></li>
</ul>
<h3><p>Customization</p>
</h3>
<ul>
<li><a href="https://github.com/QubesOS/qubes-gui-rust" rel="noopener noreferrer">Qubes-GUI-Rust (⭐9)</a> - Rust libraries for the Qubes OS GUI Protocol</li>
</ul>
<h3><p>Exploitation Tools / Unikernel-like</p>
</h3>
<ul>
<li><a href="https://github.com/ufrisk/MemProcFS" rel="noopener noreferrer">MemProcFS (⭐3.5k)</a> - MemProcFS is an easy and convenient way of viewing physical memory as files in a virtual file system.<ul>
<li><a href="https://github.com/ufrisk/MemProcFS-plugins" rel="noopener noreferrer">MemProcFS-Plugins (⭐54)</a> - This repository contains various non-core plugins for MemProcFS - The Memory Process File System.</li>
</ul>
</li>
</ul>
<h3><p>Training and Materials / Extra Info</p>
</h3>
<ul>
<li><a href="https://anonymousplanet.org" rel="noopener noreferrer">Anonymous Planet</a> - The Hitchhiker’s Guide to Online Anonymity: the comprehensive guide for online anonymity and OpSec.<ul>
<li><a href="http://thgtoa27ujspeqxasrfvcf5aozqdczvgmwgorrmblh6jn4nino3spcqd.onion/" rel="noopener noreferrer">Anonymous Planet Onion</a> - For those who wish to read over the anonymous Tor network.</li>
<li><a href="https://psa.anonymousplanet.org/" rel="noopener noreferrer">Privacy-Security-Anonymity Matrix Space</a> - The place to be for all topics regarding privacy, anonymity and other subjects. Rooms are click-to-join.</li>
</ul>
</li>
</ul>
<h3><p>Qubes OS Legends / Extra Info</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/team/#core-team" rel="noopener noreferrer">Core Team</a> - Qubes OS core team.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/3/"/>
    <summary>7 awesome projects updated on Jan 16 - Jan 22, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/2/</id>
    <title>Awesome Qubes OS Updates on Jan 09 - Jan 15, 2023</title>
    <updated>2023-01-12T01:51:46.170Z</updated>
    <published>2023-01-09T12:45:19.180Z</published>
    <content type="html"><![CDATA[<h3><p>Qubes OS Websites</p>
</h3>
<ul>
<li><a href="https://dev.qubes-os.org/en/latest/" rel="noopener noreferrer">Qubes OS Development Documentation</a> - Qubes OS development documentation.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/" rel="noopener noreferrer">Qubes OS Documentation</a> - Qubes OS main documentation.</li>
</ul>

<ul>
<li><a href="https://github.com/QubesOS/qubes-doc" rel="noopener noreferrer">Qubes OS GitHub Documentation (⭐358)</a> - Qubes OS GitHub latest documentation.</li>
</ul>
<h3><p>VM-Hardening</p>
</h3>
<ul>
<li><a href="https://github.com/3hhh/qcrypt" rel="noopener noreferrer">Qcrypt (⭐18)</a> -qcrypt is a multilayer encryption tool for Qubes OS.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/vm-sudo/" rel="noopener noreferrer">Passwordless root access in Qubes</a> - In Qubes VMs there is no point in isolating the root account from the user account.</li>
</ul>
<h3><p>Customization</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/t/easy-brightness-adjustment/15902/2" rel="noopener noreferrer">Brightness-Ajustment</a> - Easy brightness adjustment</li>
</ul>

<ul>
<li><a href="https://forum.qubes-os.org/t/where-is-the-most-optimal-place-to-put-custom-folder-icons/15740/3" rel="noopener noreferrer">Custom icons</a> - Place the custom folder icons ~/.local/share/icons is a persistent place to place the custom folder icons and so is /usr/share/icons.</li>
</ul>

<ul>
<li><a href="https://github.com/3o14r473/GUIDE_how-to-install-dwm-in-qubesos" rel="noopener noreferrer">Suckless dwm (⭐12)</a> - How to install dwm in Qubes OS.</li>
</ul>
<h3><p>GPU</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/doc/gui-configuration/" rel="noopener noreferrer">GUI-configuration</a> - Adjust your GUI configuration to meet your display needs.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/gui-domain/" rel="noopener noreferrer">GUI-domain</a> - On this page, we describe how to set up a GUI domain.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/gui-troubleshooting/" rel="noopener noreferrer">GUI-troubleshooting</a> - Learn to troubleshoot your GUI configuration.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/gui/" rel="noopener noreferrer">GUI-virtualization</a> - All AppVM X applications connect to local (running in AppVM) Xorg servers.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/how-to-use-pci-devices/" rel="noopener noreferrer">How-to-use-pci-devices</a> - This page is part of device handling in qubes.</li>
</ul>

<ul>
<li><a href="https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/install-nvidia-driver.md" rel="noopener noreferrer">Install-nvidia-driver (⭐258)</a> - Nvidia proprietary driver installation.</li>
</ul>

<ul>
<li><a href="https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/nvidia-troubleshooting.md" rel="noopener noreferrer">Nvidia-troubleshooting (⭐258)</a> - Nvidia Troubleshooting Guide</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / OpenVPN</p>
</h3>
<ul>
<li><a href="https://github.com/QubesOS-contrib/qubes-tunnel" rel="noopener noreferrer">Qubes-Tunnel (⭐25)</a> - Manage, run, protect VPN connections in Proxy VMs.</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / Tor</p>
</h3>
<ul>
<li><a href="http://www.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion" rel="noopener noreferrer">Qubes OS Onion</a> - Qubes OS onion address on the Tor network.</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / Crypto</p>
</h3>
<ul>
<li><a href="https://github.com/DeSciWorldDAO/awesome-desci" rel="noopener noreferrer">Awesome-DeSci (⭐110)</a> - A curated list of awesome Decentralized Science (DeSci) resources, projects, articles and more.</li>
</ul>
<h3><p>Kernels / Microkernels</p>
</h3>
<ul>
<li><a href="https://github.com/QubesOS/qubes-linux-kernel" rel="noopener noreferrer">Qubes-linux-kernel (⭐92)</a> - Qubes package for Linux kernel.</li>
</ul>

<ul>
<li><a href="https://sel4.systems/" rel="noopener noreferrer">seL4</a> - seL4 is a high-assurance, high-performance operating system microkernel.<ul>
<li><a href="https://trustworthy.systems/projects/TS/makatea" rel="noopener noreferrer">makatea</a> - Qubes OS like operating system but with seL4.</li>
</ul>
</li>
</ul>
<h3><p>Kernels / Unikernels</p>
</h3>
<ul>
<li><a href="https://github.com/uniqernel/awesome-unikernels" rel="noopener noreferrer">Awesome-Unikernels (⭐47)</a> - Secure, lightweight and high performance approach to application delivery.</li>
</ul>

<ul>
<li><a href="https://github.com/mirage/qubes-mirage-firewall" rel="noopener noreferrer">Qubes-Mirage-Firewall (⭐219)</a> - A unikernel that can run as a Qubes OS ProxyVM, replacing sys-firewall.</li>
</ul>
<h3><p>Qubes OS Server / Unikernel-like</p>
</h3>
<ul>
<li><a href="https://github.com/Rudd-O/qubes-network-server" rel="noopener noreferrer">Qubes-network-server (⭐112)</a> - Turn your Qubes OS into a networking server.</li>
</ul>

<ul>
<li><a href="https://github.com/QubesOS-contrib/qubes-remote-desktop" rel="noopener noreferrer">Qubes-remote-desktop (⭐9)</a> - SystemD services for creating VNC server session in dom0 or any Qube.</li>
</ul>
<h3><p>Exploitation Tools / Unikernel-like</p>
</h3>
<ul>
<li><a href="https://github.com/cpuu/awesome-fuzzing" rel="noopener noreferrer">Awesome-Fuzzing (⭐884)</a> - A curated list of references to awesome Fuzzing for security testing. Additionally there is a collection of freely available academic papers, tools and so on.</li>
</ul>

<ul>
<li><a href="https://codeql.github.com/" rel="noopener noreferrer">CodeQL</a> - Discover vulnerabilities across a codebase with CodeQL.</li>
</ul>

<ul>
<li><a href="https://github.com/joernio/joern" rel="noopener noreferrer">Joern (⭐2.4k)</a> - Joern is a platform for analyzing source code, bytecode, and binary executables. It generates code property graphs (CPGs), a graph representation of code for cross-language code analysis.</li>
</ul>

<ul>
<li><a href="https://libvmi.com/" rel="noopener noreferrer">Libvmi</a> - LibVMI is a C library with Python bindings that makes it easy to monitor the low-level details of a running virtual machine.</li>
</ul>

<ul>
<li><a href="https://github.com/memflow/memflow" rel="noopener noreferrer">Memflow (⭐852)</a> - memflow is a library that enables introspection of various machines (hardware, virtual machines, memory dumps) in a generic fashion.</li>
</ul>

<ul>
<li><a href="https://github.com/Wenzel/libmicrovmi" rel="noopener noreferrer">Microlibvmi (⭐176)</a> - A cross-platform unified Virtual Machine Introspection API library.</li>
</ul>

<ul>
<li><a href="https://github.com/radareorg/radare2" rel="noopener noreferrer">Radare2 (⭐22k)</a> - Libre Reversing Framework for Unix Geeks.</li>
</ul>
<h3><p>Optics and Extra Info / UX - User Experience</p>
</h3>
<ul>
<li><a href="https://vimeo.com/542041258" rel="noopener noreferrer">UX Bessie</a> - Qubes OS AppMenu Design Direction. Part of 2020/21 MOSS funded UX work.</li>
</ul>
<h3><p>Training and Materials / Extra Info</p>
</h3>
<ul>
<li><a href="https://github.com/QubesOS/training-materials/" rel="noopener noreferrer">Training-materials (⭐5)</a> - A Collection of training materials for Qubes OS.
-<a href="https://github.com/kennethrrosen/qubes-for-journalists/" rel="noopener noreferrer">Qubes for Journalists (⭐19)</a> - Existing guides and infrastructure for journalists insufficiently prepares them for digitally interacting with sources, working on sensitive stories while protecting sensitive materials offline and online, and traveling cross borders with personal and professional data.</li>
</ul>

<ul>
<li><a href="https://github.com/rootkovska/qubes-diagrams" rel="noopener noreferrer">Qubes-diagrams (⭐16)</a> - Qubes OS architecture diagrams.</li>
</ul>

<ul>
<li><a href="https://github.com/QubesOS/qubes-artwork" rel="noopener noreferrer">Qubes-artwork (⭐14)</a> - This repository contains various artworks for Qubes OS.</li>
</ul>

<ul>
<li><a href="https://pwn.college/" rel="noopener noreferrer">pwn.college</a> - pwn.college is an education platform for students (and other interested parties) to learn about, and practice, core cybersecurity concepts in a hands-on fashion.</li>
</ul>
<h3><p>Social media / Extra Info</p>
</h3>
<ul>
<li><a href="https://mastodon.social/@QubesOS" rel="noopener noreferrer">Mastodon</a> - Qubes OS Mastodon channel</li>
</ul>

<ul>
<li><a href="https://www.reddit.com/r/Qubes/" rel="noopener noreferrer">Reddit Qubes OS</a> - General Qubes OS Reddit room.</li>
</ul>

<ul>
<li><a href="https://www.reddit.com/r/hacking_qubes_os" rel="noopener noreferrer">Reddit hacking_qubes_os</a> - Reddit room dedicated to hacking Qubes OS</li>
</ul>

<ul>
<li><a href="https://www.reddit.com/r/hack_with_qubes_os" rel="noopener noreferrer">Reddit hack_with_qubes_os</a> - Reddit room dedicated to hacking with Qubes OS</li>
</ul>

<ul>
<li><code>#xen</code>      channel on irc.oftc.net via traditional IRC clients.</li>
</ul>

<ul>
<li><code>#qubes</code>    channel on irc.libera.chat via traditional IRC clients.</li>
</ul>

<ul>
<li><code>#qubes-os</code> channel on irc.anonops.com via traditional IRC clients.</li>
</ul>
<h3><p>Qubes OS Legends / Extra Info</p>
</h3>
<ul>
<li><a href="https://vimeo.com/user1589693" rel="noopener noreferrer">Ninavizz</a> - Qubes OS UX Designer.</li>
</ul>

<ul>
<li><a href="https://github.com/unman?tab=repositories" rel="noopener noreferrer">Unman</a> - Qubes OS contributor.<ul>
<li><a href="https://qubes.3isec.org/Templates_4.2/" rel="noopener noreferrer">Templates</a> - Unman custom templates.</li>
<li><a href="https://github.com/unman/shaker" rel="noopener noreferrer">Install Scripts (⭐22)</a> -  Unman install scripts</li>
<li><a href="https://github.com/unman/notes" rel="noopener noreferrer">Notes (⭐41)</a> - a good reference</li>
<li><a href="https://github.com/unman/shaker" rel="noopener noreferrer">Shaker (⭐22)</a> - Shaker!</li>
</ul>
</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/2/"/>
    <summary>45 awesome projects updated on Jan 09 - Jan 15, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/1/</id>
    <title>Awesome Qubes OS Updates on Jan 02 - Jan 08, 2023</title>
    <updated>2023-01-08T01:54:44.605Z</updated>
    <published>2023-01-03T01:46:22.775Z</published>
    <content type="html"><![CDATA[<h3><p>System Information &amp; Requirements</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/doc/architecture/" rel="noopener noreferrer">Architecture</a> - Qubes implements a security-by-compartmentalization approach.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/audio-virtualization/" rel="noopener noreferrer">Audio virtualization</a> - VMs on Qubes OS have access to virtualized audio through the PulseAudio module.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/certified-hardware/" rel="noopener noreferrer">Certified Hardware</a> - We aim for these vendors to be as diverse as possible in terms of geography, cost, and availability.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/community-recommended-hardware/" rel="noopener noreferrer">Community-recommended hardware</a> - Community-recommended computers.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/hcl/" rel="noopener noreferrer">Hardware compatibility list (HCL)</a> - The HCL is a compilation of reports generated and submitted by users across various Qubes versions about their hardware’s compatibility with Qubes.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/system-requirements/" rel="noopener noreferrer">System Requirements</a> - User documentation / Choyhe attacker doesn’t have access to all the software running in the other domains.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/security-critical-code/" rel="noopener noreferrer">Security-critical code</a> - A list of security-critical (i.e., trusted) code components in Qubes OS.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/storage-pools/" rel="noopener noreferrer">Storage pools</a> - Qubes OS implements a security-by-isolation (or security-by-compartmentalization) approach by providing the ability to easily create many security domains.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/secondary-storage/" rel="noopener noreferrer">Secondary storage</a> - hese steps assume you have already created a separate volume group and thin pool (not thin volume) for your HDD.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/networking/" rel="noopener noreferrer">Networking</a> - In Qubes, the standard Xen networking is used, based on backend driver in the driver domain and frontend drivers in VMs.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/config-files/" rel="noopener noreferrer">Config files</a> - These files are placed in /rw, which survives a VM restart. That way, they can be used to customize a single VM instead of all VMs based on the same template. The scripts here all run as root.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/disposable-customization/" rel="noopener noreferrer">Disposable customization</a> - A disposable can be based on any app qube.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/how-to-install-software-in-dom0/" rel="noopener noreferrer">How to install software in dom0</a> - How to install a specific package</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/bind-dirs/" rel="noopener noreferrer">How to make any file persistent (bind-dirs)</a> - With bind-dirs any arbitrary files or folders can be made persistent in app qubes.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/mount-from-other-os/" rel="noopener noreferrer">How to mount a Qubes partition from another OS</a> - When a Qubes OS install is unbootable or booting it is otherwise undesirable, this process allows for the recovery of files stored within the system.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/installing-contributed-packages/" rel="noopener noreferrer">Installing contributed packages</a> - This page is for users who wish to install contributed packages.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/managing-vm-kernels/" rel="noopener noreferrer">Managing qube kernels</a> - By default, VMs kernels are provided by dom0.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/qubes-service/" rel="noopener noreferrer">Qubes service</a> - Usage documentation is in the qvm-service man page.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/rpc-policy/" rel="noopener noreferrer">RPC policies</a> - This document explains the basics of RPC policies in Qubes.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/resize-disk-image/" rel="noopener noreferrer">Resize disk image</a> - By default Qubes uses thin volumes for the disk images.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/standalones-and-hvms/" rel="noopener noreferrer">Standalones and HVMs</a> - A standalone is a type of qube that is created by cloning a template. Unlike templates, however, standalones do not supply their root filesystems to other qubes.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/volume-backup-revert/" rel="noopener noreferrer">Volume backup and revert</a> - With Qubes, it is possible to revert one of a VM’s storage volumes to a previous state using the automatic snapshot that is normally saved every time a VM is shutdown.</li>
</ul>
<h3><p>Downloading, Installing, Upgrading, and Building</p>
</h3>
<ul>
<li><a href="https://github.com/QubesOS/qubes-builderv2" rel="noopener noreferrer">Building (⭐21)</a> - This is the second generation of the Qubes OS builder.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/installation-guide/" rel="noopener noreferrer">Installing</a>  - Qubes OS installation guide!</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/upgrade/" rel="noopener noreferrer">Upgrading</a> - These guides are for upgrading from one version of Qubes to another.</li>
</ul>
<h3><p>How-to guides</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/" rel="noopener noreferrer">How to back up, restore, and migrate</a> - With Qubes, it’s easy and secure to back up and restore your whole system, as well as to migrate between two physical machines.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/how-to-copy-and-move-files/" rel="noopener noreferrer">How to copy and move files</a> - This page is about copying and moving files.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/how-to-copy-and-paste-text/" rel="noopener noreferrer">How to copy and paste text</a> - This page is about copying and pasting plain text.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/how-to-copy-from-dom0/" rel="noopener noreferrer">How to copy from dom0</a> - This page covers copying files and clipboard text between dom0 and domUs.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/how-to-enter-fullscreen-mode/" rel="noopener noreferrer">How to enter fullscreen mode</a> - Normally, the Qubes GUI virtualization daemon restricts the VM from “owning” the full screen.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/how-to-install-software/" rel="noopener noreferrer">How to install software</a> - When you wish to install software in Qubes OS, you should generally install it in a template.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/how-to-update/" rel="noopener noreferrer">How to update</a> - This page is about updating your system while staying on the same supported version of Qubes OS.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/how-to-use-pci-devices/" rel="noopener noreferrer">How to use PCI devices</a> - Unlike other devices (USB, block, mic), PCI devices need to be attached on VM-bootup.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/how-to-use-usb-devices/" rel="noopener noreferrer">How to use USB devices</a> - Attaching USB devices to VMs requires a USB Qube.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/how-to-use-block-storage-devices/" rel="noopener noreferrer">How to use block storage devices</a> - This page is part of device handling in Qubes.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/how-to-use-devices/" rel="noopener noreferrer">How to use devices</a> - This is an overview of device handling in Qubes OS.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/how-to-use-disposables/" rel="noopener noreferrer">How to use disposables</a> - A disposable is a lightweight Qube that can be created quickly and will self-destruct when closed.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/how-to-use-optical-discs/" rel="noopener noreferrer">How to use optical discs</a> - Passthrough reading and recording (a.k.a., “burning”) are not supported by Qubes OS.</li>
</ul>
<h3><p>Templates</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/doc/templates/debian/" rel="noopener noreferrer">Debian templates</a> - The Debian template is an officially supported template in Qubes OS.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/templates/fedora/" rel="noopener noreferrer">Fedora templates</a> - The Fedora template is the default template in Qubes OS.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/templates/minimal/" rel="noopener noreferrer">Minimal templates</a> - The minimal templates are lightweight versions of their standard template counterparts.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/templates/" rel="noopener noreferrer">Templates</a> - In Getting Started, we covered the distinction in Qubes OS between where you install your software and where you run your software.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/template-implementation/" rel="noopener noreferrer">Template implementation</a> - Describes template implementation.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/template-manager/" rel="noopener noreferrer">Template manager</a> -  A template manager application.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/templates/xfce/" rel="noopener noreferrer">Xfce templates</a> - If you would like to use Xfce (more lightweight compared to GNOME desktop environment) Linux distribution in your Qubes, you can install one of the available Xfce templates for Fedora, CentOS or Gentoo.</li>
</ul>
<h3><p>VM-Hardening</p>
</h3>
<ul>
<li><a href="https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/anonymizing-your-mac-address.md" rel="noopener noreferrer">Anonymizing your MAC Address (⭐258)</a> - Although the MAC address is not the only metadata broadcast by network hardware, changing your hardware's default MAC Address could be an important step in protecting privacy.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/data-leaks/" rel="noopener noreferrer">Data leaks</a> - Firewalling in Qubes is not intended to be a leak-prevention mechanism.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/device-handling-security/" rel="noopener noreferrer">Device handling security</a> - Any additional ability a VM gains is additional attack surface.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/firewall/" rel="noopener noreferrer">Firewall</a> - Every Qube in Qubes is connected to the network via a FirewallVM, which is used to enforce network-level policies.</li>
</ul>

<ul>
<li><a href="https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/w3m.md" rel="noopener noreferrer">Reducing the fingerprint of the text-based web browser w3m (⭐258)</a> - You can reduce the amount of information w3m gives about itself and the environment it is running in (and, by extension, you).</li>
</ul>

<ul>
<li><a href="https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/tails.md" rel="noopener noreferrer">Running Tails in Qubes (⭐258)</a> - Tails stands for The Amnesic Incognito Live System.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/split-gpg/" rel="noopener noreferrer">Split GPG</a> - Split GPG implements a concept similar to having a smart card with your private GPG keys, except that the role of the “smart card” is played by another Qubes app Qube.</li>
</ul>

<ul>
<li><a href="https://github.com/rustybird/qubes-split-dm-crypt" rel="noopener noreferrer">Split dm-crypt (⭐23)</a> - Instead of directly attaching an encrypted LUKS1 partition from a source VM such as sys-usb to a destination VM and decrypting it there.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/u2f-proxy/" rel="noopener noreferrer">U2F proxy</a> - The Qubes U2F Proxy is a secure proxy intended to make use of U2F two-factor authentication devices with web browsers without exposing the browser to the full USB stack, not unlike the USB keyboard and mouse proxies implemented in Qubes.</li>
</ul>

<ul>
<li><a href="https://github.com/Qubes-Community/Contents/blob/master/docs/security/multifactor-authentication.md" rel="noopener noreferrer">Using Multi-Factor Authentication with Qubes (⭐258)</a> - This page concerns multi-factor authentication for logging into external services, not for logging into Qubes itself.</li>
</ul>

<ul>
<li><a href="https://docs.crp.to/qubes.html" rel="noopener noreferrer">Using OnlyKey with Qubes OS</a> - The following setup instructions walk through the process of configuring dom0 and a USB qube so that OnlyKey will function as a keyboard and be able to communicate with the OnlyKey app (required for TOTP).</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/qrexec/" rel="noopener noreferrer">Qrexec: secure communication across domains</a> - The qrexec framework is used by core Qubes components to implement communication between domains.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/qrexec-socket-services/" rel="noopener noreferrer">Qrexec: socket-based services</a> - The qrexec allows implementing services not only as executable files, but also as Unix sockets.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/qmemman/" rel="noopener noreferrer">Qubes memory manager (qmemman)</a> - Provides automatic balancing of memory across participating PV and HVM domains, based on their memory demand</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/yubikey/" rel="noopener noreferrer">YubiKey</a> - Most use cases for the YubiKey can be achieved exactly as described by the manufacturer or other instructions found online.</li>
</ul>
<h3><p>Customization</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/doc/awesomewm/" rel="noopener noreferrer">AwesomeWM (window manager)</a> - This is an rpm package for awesomewm with the patches for Qubes.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/i3/" rel="noopener noreferrer">i3 (window manager)</a> - i3 is part of the stable repository (as of Qubes R3.1) and can be installed by using the dom0 update mechanism.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/kde/" rel="noopener noreferrer">KDE (desktop environment)</a> -  KDE was the default desktop environment in Qubes</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / Anonymity</p>
</h3>
<ul>
<li><a href="https://github.com/ipfs/ipfs" rel="noopener noreferrer">ipfs (⭐23k)</a> - A peer-to-peer hypermedia protocol to make the web faster, safer, and more open.</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / Crypto</p>
</h3>
<ul>
<li><a href="https://github.com/Qubes-Community/Contents/blob/master/docs/security/split-bitcoin.md" rel="noopener noreferrer">Split Bitcoin Wallet (⭐258)</a> - A "split" bitcoin wallet is a strategy of protecting your bitcoin by having your wallet split into an offline "cold storage" wallet and an online "watching only" wallet.</li>
</ul>
<h3><p>Kernels / Crypto</p>
</h3>
<ul>
<li><a href="https://ebpf.io" rel="noopener noreferrer">eBPF</a> - eBPF is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in an operating system kernel.</li>
</ul>
<h3><p>Kernels / Microkernels</p>
</h3>
<ul>
<li><a href="https://openxt.org/" rel="noopener noreferrer">OpenXT</a> - OpenXT is an open-source development toolkit for hardware-assisted security research and appliance integration.</li>
</ul>
<h3><p>Kernels / Unikernels</p>
</h3>
<ul>
<li><a href="http://cnp.neclab.eu/projects/clickos" rel="noopener noreferrer">ClickOS</a> - Efficient network function virtualization platform, optimized for Xen and developed by NEC.</li>
</ul>

<ul>
<li><a href="http://lsub.org/ls/clive.html" rel="noopener noreferrer">Clive</a> - Research project from Rey Juan Carlos University (Madrid), developed in Go.</li>
</ul>

<ul>
<li><a href="https://galois.com/project/halvm" rel="noopener noreferrer">HaLVM</a> - Port of Glasgow Haskell compiler producing Xen optimized unikernels.</li>
</ul>

<ul>
<li><a href="https://wiki.xen.org/wiki/Mini-OS" rel="noopener noreferrer">Mini-OS</a> - Reference kernel distributed with Xen.</li>
</ul>
<h3><p>Kernels / Unikernel-like</p>
</h3>
<ul>
<li><a href="https://www.microsoft.com/en-us/research/project/drawbridge" rel="noopener noreferrer">Drawbridge</a> - Research prototype platform from Microsoft.</li>
</ul>

<ul>
<li><a href="https://github.com/oscarlab/graphene" rel="noopener noreferrer">Graphene (⭐780)</a> - Library OS optimized for Intel SGX.</li>
</ul>
<h3><p>Qubes OS Server / Unikernel-like</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/doc/admin-api/" rel="noopener noreferrer">Admin API</a> - The goals of the Admin API system is to provide a way for the user to manage the domains without direct access to dom0.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/qubes-core-admin-client/" rel="noopener noreferrer">Qubes core admin client</a> - Qubes core admin client’s documentation!</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/qubes-core-admin/" rel="noopener noreferrer">Qubes core admin</a> - Qubes core-admin’s documentation!</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/qubes-core-stack/" rel="noopener noreferrer">Qubes core stack</a> - Introducing the Next Generation Qubes Core Stack.</li>
</ul>
<h3><p>Exploitation Tools / Unikernel-like</p>
</h3>
<ul>
<li><a href="https://github.com/rwxrob/bonzai" rel="noopener noreferrer">Bonzai (⭐225)</a> - It's like a modular, multicall BusyBox builder for Go with built in completion and embedded documentation support.</li>
</ul>

<ul>
<li><a href="https://github.com/ufrisk/LeechCore" rel="noopener noreferrer">LeechCore (⭐607)</a> - The LeechCore Memory Acquisition Library focuses on Physical Memory Acquisition using various hardware and software based methods.<ul>
<li><a href="https://github.com/ufrisk/LeechCore-plugins" rel="noopener noreferrer">LeechCore-Plugins (⭐35)</a> - This repository contains various plugins for LeechCore - Physical Memory Acquisition Library.</li>
</ul>
</li>
</ul>

<ul>
<li><a href="https://github.com/volatilityfoundation/volatility3" rel="noopener noreferrer">Volatility3 (⭐3.1k)</a> - Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples.</li>
</ul>
<h3><p>Exploitation Tools / Xen Exploitation</p>
</h3>
<ul>
<li><a href="https://www.youtube.com/watch?v=c4DnlP88D2Y" rel="noopener noreferrer">Software Attacks on Hypervisor Emulation of Hardware</a> - <a href="https://www.troopers.de/downloads/troopers17/TR17_Attacking_hypervisor_through_hardwear_emulation.pdf" rel="noopener noreferrer">[PDF Slides]</a></li>
</ul>

<ul>
<li><a href="https://www.youtube.com/watch?v=nWvg7NKwOjg" rel="noopener noreferrer">The Arms Race Over Virtualization</a> - <a href="https://www.blackhat.com/docs/us-16/materials/us-16-Luan-Ouroboros-Tearing-Xen-Hypervisor-With-The-Snake.pdf" rel="noopener noreferrer">[PDF Slides]</a></li>
</ul>
<h3><p>Companies using Qubes OS / Extra Info</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/partners/" rel="noopener noreferrer">Qubes Partners</a> - The Qubes Project relies greatly on the generous support of the organizations, companies, and individuals who have become Qubes Partners.</li>
</ul>
<h3><p>Social media / Extra Info</p>
</h3>
<ul>
<li><a href="https://www.clubhouse.com/house/qubes-os" rel="noopener noreferrer">ClubHouse</a> - Qubes OS Clubhouse Room</li>
</ul>
<h3><p>Qubes OS Legends / Extra Info</p>
</h3>
<ul>
<li><a href="https://en.wikipedia.org/wiki/Joanna_Rutkowska" rel="noopener noreferrer">Joanna Rutkowska</a> - Founder of Qubes OS.<ul>
<li><a href="https://blog.invisiblethings.org/" rel="noopener noreferrer">Blog</a> - Personal Blog.</li>
<li><a href="https://invisiblethingslab.com/resources/bh08/part1.pdf" rel="noopener noreferrer">Subverting the Xen Hypervisor [PDF]</a> - Xen 0wning Trilogy
Part One</li>
<li><a href="https://invisiblethingslab.com/resources/bh08/part2.pdf" rel="noopener noreferrer">Preventing and Detecting Xen Hypervisor Subversions [PDF]</a> - Xen 0wning Trilogy
Part Two</li>
<li><a href="https://invisiblethingslab.com/resources/bh08/part3.pdf" rel="noopener noreferrer">Bluepilling the Xen Hypervisor [PDF]</a> - Xen 0wning Trilogy Part Three</li>
</ul>
</li>
</ul>

<ul>
<li><a href="https://github.com/marmarek" rel="noopener noreferrer">Marek Marczykowski-Górecki</a> - Lead developer at Qubes OS.</li>
</ul>
<h3><p>Releases / Extra Info</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org/doc/releases/notes/" rel="noopener noreferrer">Release notes</a> - Developer documentation Notes</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/releases/schedules/" rel="noopener noreferrer">Release schedules</a> -  Developer Release Schedules</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/supported-releases/" rel="noopener noreferrer">Supported releases</a> - This page details the level and period of support for releases of operating systems in the Qubes ecosystem.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/doc/testing/" rel="noopener noreferrer">Testing new releases and updates</a> - Testing new Qubes OS releases and updates is one of the most helpful ways in which you can contribute to the Qubes OS Project.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/1/"/>
    <summary>90 awesome projects updated on Jan 02 - Jan 08, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2022/52/</id>
    <title>Awesome Qubes OS Updates on Dec 26 - Jan 01, 2022</title>
    <updated>2022-12-29T12:41:38.069Z</updated>
    <published>2022-12-28T12:41:44.125Z</published>
    <content type="html"><![CDATA[<h3><p>VM-Hardening</p>
</h3>
<ul>
<li><a href="https://www.kicksecure.com/wiki/Kicksecure-Qubes_Security" rel="noopener noreferrer">Kicksecure</a> - The following list of actionable items can help to improve security on the Qubes platform, and by extension Kicksecure ™ for Qubes users.</li>
</ul>

<ul>
<li><a href="https://github.com/tasket/Qubes-VM-hardening" rel="noopener noreferrer">Qubes-VM-hardening (⭐74)</a> - Leverage Qubes template non-persistence to fend off malware at VM startup: Lock-down, quarantine and check contents of /rw private storage that affect the execution environment.</li>
</ul>
<h3><p>Clearnet &amp; Anonymous Networking / Anonymity</p>
</h3>
<ul>
<li><a href="https://www.whonix.org/wiki/Qubes" rel="noopener noreferrer">Whonix</a> - Qubes-Whonix ™ is the seamless combination of Qubes OS and Whonix™ for advanced security and anonymity.</li>
</ul>
<h3><p>Social media / Extra Info</p>
</h3>
<ul>
<li><a href="https://matrix.to/#/#qubes-os-discord-bridge-v2:matrix.org" rel="noopener noreferrer">Matrix Discord Bridge</a> - Qubes OS Discord General Room Bridge</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2022/52/"/>
    <summary>4 awesome projects updated on Dec 26 - Jan 01, 2022</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2021/35/</id>
    <title>Awesome Qubes OS Updates on Aug 30 - Sep 05, 2021</title>
    <updated>2021-09-03T02:16:00.000Z</updated>
    <published>2021-09-01T20:02:54.000Z</published>
    <content type="html"><![CDATA[<h3><p>Qubes OS Server / Unikernel-like</p>
</h3>
<ul>
<li><a href="https://qubes-ansible.readthedocs.io/en/latest/" rel="noopener noreferrer">Ansible</a> - Automation with Ansible.</li>
</ul>
<h3><p>Social media / Extra Info</p>
</h3>
<ul>
<li><a href="https://forum.qubes-os.org/" rel="noopener noreferrer">Forum</a> - Qubes OS Discorse Forum</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2021/35/"/>
    <summary>2 awesome projects updated on Aug 30 - Sep 05, 2021</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2021/33/</id>
    <title>Awesome Qubes OS Updates on Aug 16 - Aug 22, 2021</title>
    <updated>2021-08-16T16:08:50.000Z</updated>
    <published>2021-08-16T01:31:44.000Z</published>
    <content type="html"><![CDATA[<h3><p>Qubes OS Websites</p>
</h3>
<ul>
<li><a href="https://www.qubes-os.org" rel="noopener noreferrer">Qubes OS</a> - Qubes OS is an operating system built out of securely-isolated compartments called Qubes.</li>
</ul>

<ul>
<li><a href="https://www.qubes-os.org/news/" rel="noopener noreferrer">Qubes OS News</a> - Latest Qubes OS News.</li>
</ul>
<h3><p>Optics and Extra Info / Extra Info</p>
</h3>
<ul>
<li><a href="https://3mdeb.com/" rel="noopener noreferrer">3mdeb</a> - We’re hands-on firmware experts with years of experience writing elegant, scalable and custom code for clients.</li>
</ul>
<h3><p>Social media / Extra Info</p>
</h3>
<ul>
<li><a href="https://discord.gg/YMUbTt7ZRG" rel="noopener noreferrer">Discord</a> - Qubes OS discord invite link</li>
</ul>

<ul>
<li><a href="https://www.facebook.com/QubesOS/" rel="noopener noreferrer">Facebook</a> - Qubes OS facebook page</li>
</ul>

<ul>
<li><a href="https://www.linkedin.com/company/qubes-os/" rel="noopener noreferrer">LinkedIn</a> - Qubes OS linkedin account</li>
</ul>

<ul>
<li><a href="https://matrix.to/#/#cybersec-qubes_os:matrix.org" rel="noopener noreferrer">Matrix:Qubes OS</a> - General Qubes OS matrix room</li>
</ul>

<ul>
<li><a href="https://twitter.com/QubesOS" rel="noopener noreferrer">Twitter</a> - Qubes OS Twitter account</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2021/33/"/>
    <summary>8 awesome projects updated on Aug 16 - Aug 22, 2021</summary>
  </entry>
</feed>