Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
App Manager GUI
A multiplatform tool using ADB to effortlessly manage Android apps: extract icons, view app info, debloat, reinstall, and more with intuitive controls.
π Links:
- Download
- Δ°nstallation
- Screenshots
- Features
- Source code
Developer: BlassGO
π· Tags: #Windows #Linux #Tools
A multiplatform tool using ADB to effortlessly manage Android apps: extract icons, view app info, debloat, reinstall, and more with intuitive controls.
π Links:
- Download
- Δ°nstallation
- Screenshots
- Features
- Source code
Developer: BlassGO
β€οΈ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
β Star the repo/app
β Buy a coffee for the developer
π Contribute code, issues, or pull-requests
π· Tags: #Windows #Linux #Tools
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
AYA
AYA is a desktop application for easily controlling android devices, which can be considered as a GUI wrapper for ADB.
π Links:
- Download
- Screenshots
- Features
- Website
- Source code
Developer: LiriLiri
π· Tags: #Windows #MacOS #Linux #Tools
AYA is a desktop application for easily controlling android devices, which can be considered as a GUI wrapper for ADB.
π Links:
- Download
- Screenshots
- Features
- Website
- Source code
Developer: LiriLiri
β€οΈ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
β Star the repo/app
β Buy a coffee for the developer
π Contribute code, issues, or pull-requests
π· Tags: #Windows #MacOS #Linux #Tools
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
Sine
Sine is a community-driven mod/theme manager for all Firefox-based browsers, designed to be a more efficient, powerful, user-friendly, and compatible alternative to manual installation.
π Links:
- Download
- Screenshot
- Features
- Source code
Developer: CosmoCreeper
π· Tags: #Linux #Windows #MacOS #Browser #Customization
Sine is a community-driven mod/theme manager for all Firefox-based browsers, designed to be a more efficient, powerful, user-friendly, and compatible alternative to manual installation.
π Links:
- Download
- Screenshot
- Features
- Source code
Developer: CosmoCreeper
β€οΈ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
β Star the repo/app
β Buy a coffee for the developer
π Contribute code, issues, or pull-requests
π· Tags: #Linux #Windows #MacOS #Browser #Customization
Forwarded from 0β’Bytesβ’1
Welcome to my Alice tea party! π«π
I decided to write a series of short posts about secure operating systems π₯π§
Today, we'll take a look at Whonix and find out if it's as good and anonymous as people say.Spoiler alert: no, it's not.
Let me clarify right away: Whonix is not a full-fledged operating system, but a tool for anonymity that can work independently or as a router in Qubes OS. In this article, I will focus on analyzing how it works as a standalone system
How does Whonix work?π§©
Whonix is built on two virtual machines: Whonix-Gateway and Whonix-Workstation. Gateway configures and routes all your traffic through the Tor network. Workstation is your workplace. If you want to dig deeper, check out their documentation.
Problems with Whonix π
Now to the point: why Whonix isn't really necessary. Let's start with Gateway. It's just Debian with Tor pre-installed and a bunch of scripts that redirect traffic through Tor. Everything is tied to the configuration in the settings file and iptables rules. Cool? Not really. Plus, Whonix drags along old Debian, where packages are updated once in a blue moon.
Whonix positions itself as super protection against leaks, but if you don't understand what you're doing, no virtual machine will save you. For example, if you run a browser with JavaScript or download files and then open them outside of Workstation, your anonymity is gone.
By the way, Whonix can only be run without problems on VirtualBox. You may argue that there are versions for KVM/QEMU on their website. But that's where the problems begin. If you take Whonix for KVM, you won't be able to install it just like that β you need to edit the configuration, and there are no detailed instructions on how to do this anywhere. With VirtualBox, however, there are no such problems β everything works out of the box.
But what's wrong with VirtualBox?πͺ€
Besides the fact that it is significantly slower than KVM. In March 2025, a vulnerability CVE-2025-30712 with a rating of 8.1 appeared in Virtualbox. It allows an attacker with access to the host system to perform a VM escape, i.e., to get out of the virtual machine onto your main computerπ« . Proof-of-concept is already circulating on the network, and exploitation is easier than it seems. If the host is compromised, all your anonymity goes down the drain, and your real IP or other data may leak.
How to make an analogue of Whunix Gateway? βοΈ
But there is another way. The Gateway model itself is not bad. But you can create a machine with it yourself without Whunix, using a minimalist Linux (such as Gentoo or even FreeBSD instead of Linux). Then configure Tor directly. After all, Gateway is just a wrapper around the standard Tor and iptables settings, which can be found on Google in five minutes. Now add the iptables you found and DNSPort to the Tor config so that DNS requests also go through Tor, and that's it. This takes up less space and reduces the attack surface.
Conclusion
To be fair, Whonix isn't always bad. But it can be useful in conjunction with Qubes OS (where it runs in KVM, by the way), which has additional security mechanisms, such as domain isolation, that enhance security. But apart from Qubes, Whonix is pretty pointless. You might think it's suitable for those who don't want to bother with configuring Tor, but that's not the case. To run Whonix on a decent VM, such as KVM, you'll have to go through just as much trouble.
The bottom line is simple: Whonix is not a super-anonymous OS, but a tool that complicates life more than it protects itπ
I hope you found this useful.β€οΈβ¨ If you wish, you can explore the topic yourself by reading research and testing the system.
Here are some good articles about Whonix:
THESIS.pdf β here is an overview of anonymous operating systems, including Whonix.
Whonix and Tor Limitations β about the shortcomings of Whonix and Tor.
JOSH Article β analysis of Whonix limitations.
#anonymity #linux #whunix #cve #anonymity_os #tor #security
I decided to write a series of short posts about secure operating systems π₯
Today, we'll take a look at Whonix and find out if it's as good and anonymous as people say.
Let me clarify right away: Whonix is not a full-fledged operating system, but a tool for anonymity that can work independently or as a router in Qubes OS. In this article, I will focus on analyzing how it works as a standalone system
How does Whonix work?π§©
Whonix is built on two virtual machines: Whonix-Gateway and Whonix-Workstation. Gateway configures and routes all your traffic through the Tor network. Workstation is your workplace. If you want to dig deeper, check out their documentation.
Problems with Whonix π
Now to the point: why Whonix isn't really necessary. Let's start with Gateway. It's just Debian with Tor pre-installed and a bunch of scripts that redirect traffic through Tor. Everything is tied to the configuration in the settings file and iptables rules. Cool? Not really. Plus, Whonix drags along old Debian, where packages are updated once in a blue moon.
Whonix positions itself as super protection against leaks, but if you don't understand what you're doing, no virtual machine will save you. For example, if you run a browser with JavaScript or download files and then open them outside of Workstation, your anonymity is gone.
By the way, Whonix can only be run without problems on VirtualBox. You may argue that there are versions for KVM/QEMU on their website. But that's where the problems begin. If you take Whonix for KVM, you won't be able to install it just like that β you need to edit the configuration, and there are no detailed instructions on how to do this anywhere. With VirtualBox, however, there are no such problems β everything works out of the box.
But what's wrong with VirtualBox?πͺ€
Besides the fact that it is significantly slower than KVM. In March 2025, a vulnerability CVE-2025-30712 with a rating of 8.1 appeared in Virtualbox. It allows an attacker with access to the host system to perform a VM escape, i.e., to get out of the virtual machine onto your main computerπ« . Proof-of-concept is already circulating on the network, and exploitation is easier than it seems. If the host is compromised, all your anonymity goes down the drain, and your real IP or other data may leak.
How to make an analogue of Whunix Gateway? βοΈ
But there is another way. The Gateway model itself is not bad. But you can create a machine with it yourself without Whunix, using a minimalist Linux (such as Gentoo or even FreeBSD instead of Linux). Then configure Tor directly. After all, Gateway is just a wrapper around the standard Tor and iptables settings, which can be found on Google in five minutes. Now add the iptables you found and DNSPort to the Tor config so that DNS requests also go through Tor, and that's it. This takes up less space and reduces the attack surface.
Conclusion
To be fair, Whonix isn't always bad. But it can be useful in conjunction with Qubes OS (where it runs in KVM, by the way), which has additional security mechanisms, such as domain isolation, that enhance security. But apart from Qubes, Whonix is pretty pointless. You might think it's suitable for those who don't want to bother with configuring Tor, but that's not the case. To run Whonix on a decent VM, such as KVM, you'll have to go through just as much trouble.
The bottom line is simple: Whonix is not a super-anonymous OS, but a tool that complicates life more than it protects it
I hope you found this useful.β€οΈβ¨ If you wish, you can explore the topic yourself by reading research and testing the system.
Here are some good articles about Whonix:
THESIS.pdf β here is an overview of anonymous operating systems, including Whonix.
Whonix and Tor Limitations β about the shortcomings of Whonix and Tor.
JOSH Article β analysis of Whonix limitations.
#anonymity #linux #whunix #cve #anonymity_os #tor #security
Please open Telegram to view this post
VIEW IN TELEGRAM
Whonix
Whonix Documentation
A Crash Course in Anonymity and Security on the Internet.
Forwarded from Libreware
WhisperTux
Simple #voice #dictation application for #Linux. Uses whisper.cpp for offline speech-to-text transcription. No fancy GPUs are required although whisper.cpp is capable of using them if available. Once your speech is transcribed, it is sent to a ydotool daemon that will write the text into the focused application.
Features
Local speech-to-text processing via whisper.cpp (no cloud dependencies)
No expensive hardware required (works well on a plain x86 laptop with AVX instructions)
Global keyboard shortcuts for system-wide operation
Automatic text injection into focused applications
Configurable whisper models and shortcuts
https://github.com/cjams/whispertux
#assistant #speech #stt
Simple #voice #dictation application for #Linux. Uses whisper.cpp for offline speech-to-text transcription. No fancy GPUs are required although whisper.cpp is capable of using them if available. Once your speech is transcribed, it is sent to a ydotool daemon that will write the text into the focused application.
Features
Local speech-to-text processing via whisper.cpp (no cloud dependencies)
No expensive hardware required (works well on a plain x86 laptop with AVX instructions)
Global keyboard shortcuts for system-wide operation
Automatic text injection into focused applications
Configurable whisper models and shortcuts
https://github.com/cjams/whispertux
#assistant #speech #stt
GitHub
GitHub - cjams/whispertux: Simple GUI around whisper.cpp for voice-to-text on Linux
Simple GUI around whisper.cpp for voice-to-text on Linux - cjams/whispertux
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (ΓΝΓ EK4XSH | [#Exams])
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
Repertoire
Repertoire is a cross-platform application designed for musicians, dancers, magicians, or performers to help manage their repertoire (musical pieces, dance routines, or even magic tricks), track practice sessions, and organize all related media in one place. Built with Flutter, it offers a seamless experience on mobile, web, and desktop platforms.
π Links:
- Download
- Screenshots
- Features
- Source code
Developer: Adithya Jayan
π· Tags: #Android #Linux #Windows #Web #Entertaiment
Repertoire is a cross-platform application designed for musicians, dancers, magicians, or performers to help manage their repertoire (musical pieces, dance routines, or even magic tricks), track practice sessions, and organize all related media in one place. Built with Flutter, it offers a seamless experience on mobile, web, and desktop platforms.
π Links:
- Download
- Screenshots
- Features
- Source code
Developer: Adithya Jayan
β€οΈ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
β Star the repo/app
β Buy a coffee for the developer
π Contribute code, issues, or pull-requests
π· Tags: #Android #Linux #Windows #Web #Entertaiment
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
WinApps
Run Windows apps such as Microsoft Office/Adobe in Linux (Ubuntu/Fedora) and GNOME/KDE, Arch Linux, Gentoo Linux, OpenSUSE as if they were a part of the native OS, including Nautilus integration.
π Links:
- Installation
- Supported apps
- Source code
Organization: WinApps-Org
π· Tags: #Linux #Tools
Run Windows apps such as Microsoft Office/Adobe in Linux (Ubuntu/Fedora) and GNOME/KDE, Arch Linux, Gentoo Linux, OpenSUSE as if they were a part of the native OS, including Nautilus integration.
π Links:
- Installation
- Supported apps
- Source code
Organization: WinApps-Org
β€οΈ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
β Star the repo/app
β Buy a coffee for the developer
π Contribute code, issues, or pull-requests
π· Tags: #Linux #Tools
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
WhatsCLI
A command-line WhatsApp client written in Go and highly riceable with Lua scripts
π Links:
- Installation
- Screenshots
- Features
- Source code
Developer: ArturCSega
π· Tags: #Social #MacOS #Windows #Linux
A command-line WhatsApp client written in Go and highly riceable with Lua scripts
π Links:
- Installation
- Screenshots
- Features
- Source code
Developer: ArturCSega
β€οΈ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
β Star the repo/app
β Buy a coffee for the developer
π Contribute code, issues, or pull-requests
π· Tags: #Social #MacOS #Windows #Linux
Forwarded from Libreware
#KDE launches its own #Linux distribution
https://lwn.net/SubscriberLink/1037166/caa6979c16a99c9e/
https://kde.org/linux
Comments
https://lwn.net/SubscriberLink/1037166/caa6979c16a99c9e/
https://kde.org/linux
Comments
LWN.net
KDE launches its own distribution (again)
At Akademy 2025, the KDE Project released an alpha version of KDE Linux, a distribution built b [...]