Latest posts
Getting Started With helix-gpt
Helix-gpt is awesome, but its documentation wasn’t very helpful. I’ve managed to make it work, so here’s how.
…Your Cat Will Die Someday, Backups Won't
Backups are good - but if it takes 20+ minutes each time, you just won’t want to do it. This post will teach you to make syncing your backups with other devices automatic and simple.
…QubesOS GPU Support: Finally Got It Working
Remember this post? Back then I said that there was currently no solution for using your GPU inside VMs on Qubes. Well, I found a way. Now cracking/rendering on Qubes might be more realistic than ever.
…How to Use Your Own Tools on Remote Machines via SSH SOCKS Tunnel
Sometimes you want to use binaries for enumeration, but you can’t run GUI tools over SSH (like wireshark
), or you don’t want to make noise by installing binaries on the target machine (like nmap
). In this case, you can forward only the requests, not the whole application.
How to receive reverse shells and expose services to the Internet on QubesOS
QubesOS is amazing for security, and equally amazing at making CTFs 10x harder than they need to be. It’s the firewall’s fault.
Fix for no audio in minimal templates in QubesOS
The reason why audio won’t work out of the box in minimal templates (debian-12-minimal
, fedora-41-minimal
) is that the package responsible for sending audio from VMs to your host (dom0
or sys-audio
), pipewire-qubes
, isn’t included in them by default.
New HTB Academy Password Attacks Sections Writeup
A few days ago, HTB Academy added three new sections to the Password Attacks module. Since no writeups were available at the time of writing, and I needed them, I created my own.
…Fixing FreeRDP 3's BadAtom Error on QubesOS
When you try to run FreeRDP 3, you will likely get the BadAtom error. This error is vague, and as usual, there’s zero documentation about it that actually helps. Here’s the post I wish existed when I needed it.
OpenGL driver errors in QubesOS VMs: Why there’s no fix*
The reason you can’t fix this is simple: QubesOS is built on the principle of isolation, and GPUs aren’t designed to meet the strict isolation requirements QubesOS demands because they prioritize performance instead.
…How to Run Nix on Qubes Without Crying (Much)
Nix is great for keeping your system clean and your sanity slightly intact. But thanks to how QubesOS handles templates and persistence, it’s not quite plug-and-play.
…Learn to use Nix (not NixOS) in 10 minutes (it's easy)
After this guide, you will be able to:
- replace
apt
orpacman
with thenixpkgs
package repository, even if you don’t care about declarativity - use home-manager to set up all your configs and apps declaratively with just one config file and use it on any machine
- use any
nixpkgs
package one time only and without bloat, fix dependency hell and weird dependencies
The best way to use Windows on Qubes OS
Installing Windows on Qubes OS can be tricky due to its closed-source nature. Unlike Linux templates designed for Qubes OS, Windows requires the installation of Qubes Windows Tools
to function correctly (network, audio, etc.). This guide uses the qvm-create-windows-qube
tool, which is the recommended and most secure method.