A security-focused desktop operating system that aims to provide security through isolation.
This list is a collection of tools, projects, images and resources conforming to the Awesome Manifesto
Contributions very welcome but first see Contributing
Contents
- System Requirements
- Certified Hardware
- Community-recommended hardware
- Hardware compatibility list (HCL)
- How to update
- How to back up, restore, and migrate
- How to copy and paste text
- How to copy and move files
- How to copy from dom0
- How to install software
- How to use disposables
- How to enter fullscreen mode
- How to use devices
- How to use block storage devices
- How to use USB devices
- How to use PCI devices
- How to use optical discs
- Templates
- Template: Ubuntu
- Template: Windows
- Customizing Windows 7 templates
- Template: Whonix
- Template: CentOS
- Template: Gentoo
- Pentesting: BlackArch
- Pentesting: Kali
- Pentesting: Parrot
- Pentesting: PTF
- Fedora templates
- Debian templates
- Minimal templates
- Customizing Fedora minimal templates
- Xfce templates
- Tips for Using Linux in an HVM
- Creating a NetBSD VM
- An introduction to QubesOS - Fredrik Strömberg
- Qubes OS: Security Oriented Operating System
- Exploring Hacker Operating Systems: Qubes OS
- 3mdeb
- Qubes OS: The Operating System That Can Protect You Even If You Get Hacked
- Life Behind the Tinfoil: A Look at Qubes and Copperhead - Konstantin Ryabitsev, The Linux Foundation
- Joanna Rutkowska: "Qubes OS: towards reasonably secure & trustworthy personal computing"
- How to install software in dom0
- Volume backup and revert
- Standalones and HVMs
- Windows qubes
- Config files
- Secondary storage
- RPC policies
- USB qubes
- Managing qube kernels
- Salt (management software)
- Disposable customization
- Installing contributed packages
- How to make any file persistent (bind-dirs)
- GUI configuration
- Resize disk image
- Qubes service
- How to mount a Qubes partition from another OS
- KDE (desktop environment)
- i3 (window manager)
- AwesomeWM (window manager)
- How To make a VPN Gateway in Qubes - Qubes includes a number of tools that can make the client-side setup of your VPN more versatile and secure.
- Mullvad VPN - Privacy first VPN provider in Qubes OS.
- qubes-tunnel - Manage, run, protect VPN connections in Proxy VMs.
- WireGuard - WireGuard: fast, modern, secure VPN tunnel
- Firewall
- Data leaks
- Passwordless root access in qubes
- Device handling security
- Anti evil maid (AEM)
- Split GPG
- U2F proxy
- YubiKey
- Using Multi-Factor Authentication with Qubes
- How to Set Up a Split Bitcoin Wallet in Qubes
- Split dm-crypt
- Split SSH
- Using OnlyKey with Qubes OS
- Whonix for Privacy & Anonymity
- Running Tails in Qubes
- Anonymizing your MAC Address
- Signal
- Reducing the fingerprint of the text-based web browser w3m
- Architecture
- Security design goals
- Security-critical code
- Qubes core admin
- Qubes core admin client
- Qubes core stack
- GUI virtualization
- Networking
- Template implementation
- Storage pools
- Audio virtualization
- Template manager
- Inter-qube file copying (qfilecopy)
- Qubes memory manager (qmemman)
- Dom0 secure updates
- Qrexec: secure communication across domains
- Qrexec: Qubes RPC internals
- Qrexec: socket-based services
- Admin API
Contribution guidelines can be found here
This work is licensed under a Creative Commons Attribution 4.0 International License.