Skip to content

cyseckev/Qubes-OS-Security-Checklist

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

8 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ” Qubes-OS Security Checklist

Maximum anonymity & OPSEC hardening guide for Qubes OS environments – CySecKev


πŸ›‘οΈ Features

  • Secure VM isolation & workflow
  • Network hardening with VPN/TOR chains
  • Firewall & AppVM configuration scripts
  • OPSEC best practices & anonymized workflows

πŸ› οΈ Badges

Linux Qubes VPN TOR


πŸ“ Folder Structure

  • docs/ β†’ Step-by-step guides
  • scripts/ β†’ Security audit scripts
  • README.md β†’ This file
  • LICENCE β†’ MIT-Licence

Updates

πŸ› οΈ Added Script: ultimate_opsec.sh

Purpose:
Enhances Qubes OS operational security by automatically randomizing MAC addresses, disabling IPv6, and dynamically setting DNS to the currently active NetVM.
Only applies to VMs with labels blue, red, yellow, violet, and runs silently at each VM start.

Features:

  • MAC address randomization with collision avoidance
  • IPv6 disabled for network privacy
  • Dynamic DNS based on active NetVM IP
  • Label-based selective execution
  • Fully silent and error-resistant
  • Designed for automatic execution at VM startup

πŸš€ Usage

bash scripts/security_audit.sh

## πŸ“Œ Notes
- Continuous updates recommended
- Designed for research & personal security
- Not for commercial use


**ultimate_opsec.sh**

# 1️⃣ Place the script in dom0
chmod +x scripts/ultimate_opsec.sh

# 2️⃣ Run manually on a specific VM:
sudo ./scripts/ultimate_opsec.sh <VM_NAME>

# 3️⃣ Automatic execution at VM startup:

# Create autostart hook in dom0
sudo nano /etc/qubes-rpc/qubes.StartVM/10-ultimate_opsec.sh


Contents of 10-ultimate_opsec.sh:
#!/bin/bash
# Run Ultimate OPSEC script for every user VM at startup
for VM in $(qvm-ls --raw-list | grep -v '^sys-' | grep -v '^dom0'); do
    /path/to/scripts/ultimate_opsec.sh "$VM"
done


# Make the hook executable
sudo chmod +x /etc/qubes-rpc/qubes.StartVM/10-ultimate_opsec.sh

About

More anonymity & OPSEC hardening guide for Qubes OS environments

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages