qutes1b
v1.0 STABLETactical Qutebrowser configuration engineered for security operators and red team professionals. Features Matrix HUD, live threat intel feeds, and mission-critical tracking systems.
Tech Stack
JavaScript
Qutebrowser
Cybersecurity
Red Teaming
Tactical UI
2.5K+
Lines of JS
15+
Custom Scripts
50+
Key Bindings
Executive Summary
qutes1b transforms Qutebrowser into a tactical operations center for cybersecurity professionals. This highly customized configuration combines vim-like navigation with real-time threat intelligence, creating a specialized browser environment optimized for security research, penetration testing, and red team operations.
Technical Architecture
Matrix HUD Interface
- Real-time Status Bar: System metrics, network status, VPN state
- Threat Intel Integration: Live feeds from multiple sources
- Mission Clock: UTC/Zulu time with countdown timers
- Resource Monitor: CPU, RAM, and network usage
Key Features
1. Vim-Enhanced Navigation
// Custom key bindings
config.bind('gt', 'tab-next')
config.bind('gT', 'tab-prev')
config.bind('d', 'tab-close')
config.bind('u', 'undo')
config.bind('J', 'scroll-page 0 1')
config.bind('K', 'scroll-page 0 -1')
2. Security-Focused Configuration
- JavaScript blocking by default (per-site toggle)
- HTTPS-only mode with strict transport security
- Custom user agent rotation
- Privacy-hardened settings
3. Tactical Dashboard
- Quick access to security tools (Shodan, Censys, VirusTotal)
- Bookmark organization by engagement type
- Session management for multiple personas
- Screenshot automation with timestamps
Custom Scripts
threat-feed.js: Aggregates threat intelligence from:
- AlienVault OTX
- Abuse.ch
- URLhaus
- Malware Bazaar
mission-tracker.js: Tracks:
- Active engagements
- Target scope
- Findings log
- Time tracking
Installation
# Backup existing config
cp ~/.config/qutebrowser/config.py ~/.config/qutebrowser/config.py.backup
# Clone repository
git clone https://github.com/ind4skylivey/qutes1b.git
# Install configuration
cd qutes1b
./install.sh
# Or manual installation
cp config.py ~/.config/qutebrowser/
cp -r userscripts/ ~/.config/qutebrowser/
Configuration Highlights
Security Hardening
# Block third-party cookies by default
c.content.cookies.accept = 'no-3rdparty'
# Disable WebRTC to prevent IP leaks
c.content.webrtc_ip_handling_policy = 'disable-non-proxied-udp'
# Strict HTTPS
c.content.ssl.strict = True
# Disable notifications
c.content.notifications.enabled = False
Custom Styling
/* Matrix-inspired dark theme */
:root {
--bg: #0d0208;
--fg: #00ff41;
--accent: #008f11;
--warning: #ff0000;
}
Use Cases
Red Team Operations
- Anonymous browsing with multiple profiles
- Quick access to target reconnaissance tools
- Secure note-taking with encrypted storage
- Automated screenshot documentation
Security Research
- Malware analysis with isolated sessions
- Phishing site investigation
- Vulnerability research
- Threat intelligence gathering
Penetration Testing
- Organized bookmark hierarchy by test phase
- Integration with testing frameworks
- Evidence collection automation
- Client reporting tools
Performance
| Metric | Value |
|---|---|
| Startup Time | <500ms |
| Memory Usage | 150MB base |
| Tab Switch | Instant |
| Script Load | <100ms |
Customization
Adding New Threat Feeds
// In threat-feed.js
const feeds = [
{
name: 'Custom Feed',
url: 'https://api.example.com/threats',
parser: (data) => data.indicators
}
];
Key Binding Customization
# config.py
config.bind('xx', 'spawn --userscript custom-script.sh')
Security Considerations
- All scripts run in isolated context
- No external dependencies beyond Qutebrowser
- User data encrypted at rest
- No telemetry or analytics
License
MIT License - Open source for the security community