π Secure Cross-Platform Virtual Machine Manager
Sandboxing β’ Tor β’ VPN β’ Network Isolation
Features β’ Security β’ Download β’ Installation β’ Usage β’ Building
- Create & Manage VMs - Easy VM creation with customizable RAM, CPUs, and disk size
- ISO Management - Browse and quick-boot ISO images
- Quick Boot - Instantly boot any ISO without creating a VM
- Hardware Acceleration - KVM (Linux), HVF (macOS), WHPX (Windows)
- Security Profiles - Pre-configured profiles for different threat models
- Network Isolation - Multiple isolation modes for secure VM networking
- Tor Integration - Route all VM traffic through Tor network
- VPN Support - WireGuard and OpenVPN with kill switch
- Sandboxing - QEMU sandbox mode for each VM
- Firewall Rules - Auto-generated based on security profile
- Modern Dark UI - Beautiful cyberpunk-inspired interface
- Security Center - Manage security profiles and Tor/VPN status
- Network Configuration - Configure VPN, Tor, and isolation settings
- Cross-Platform - Native apps for Linux, Windows, and macOS
| Profile | Description | Use Case |
|---|---|---|
| π΄ Paranoid | Full isolation, Tor routing, no host access | Maximum anonymity, sensitive research |
| οΏ½οΏ½ Stealth | VPN + Tor chain, kill switch enabled | Anonymous browsing, journalism |
| π‘ Isolated | Complete network isolation, air-gapped | Malware analysis, offline work |
| π’ Pentesting | Internal network, tools access | Security testing, CTF |
| Mode | Description |
|---|---|
| Full | No network access - completely air-gapped |
| Host Only | Access only to host machine |
| Internal | VMs can communicate with each other only |
| Tor Only | All traffic routed through Tor |
| VPN Only | All traffic through VPN tunnel |
- SOCKS proxy routing (port 9050)
- Bridge support for censored networks
- One-click identity rotation
- Exit node selection
- DNS leak protection
- WireGuard support (recommended)
- OpenVPN support
- Kill switch - blocks traffic if VPN disconnects
- DNS leak protection
- Custom server configuration
| Platform | Download |
|---|---|
| οΏ½οΏ½ Linux (AppImage) | n01d-machine_1.1.0_amd64.AppImage |
| π§ Linux (Debian) | n01d-machine_1.1.0_amd64.deb |
| πͺ Windows (Installer) | n01d-machine_1.1.0_x64-setup.exe |
| πͺ Windows (MSI) | n01d-machine_1.1.0_x64.msi |
| π macOS (DMG) | n01d-machine_1.1.0_x64.dmg |
# Debian/Ubuntu
sudo apt install qemu-system-x86 qemu-utils
# Fedora
sudo dnf install qemu-system-x86 qemu-img
# Arch
sudo pacman -S qemu-full# Via Chocolatey
choco install qemu
# Or download from https://qemu.weilnetz.de/w64/brew install qemu# Linux
sudo apt install tor
# macOS
brew install tor
# Windows: Download Tor Expert Bundle# Linux
sudo apt install wireguard
# macOS
brew install wireguard-tools
# Windows: Download from wireguard.comchmod +x n01d-machine_1.1.0_amd64.AppImage
./n01d-machine_1.1.0_amd64.AppImagesudo dpkg -i n01d-machine_1.1.0_amd64.debRun the installer (.exe or .msi) and follow the prompts.
Open the DMG and drag n01d Machine to your Applications folder.
- Click "Create VM" in the sidebar
- Enter VM name and select an ISO
- Configure RAM, CPUs, and disk size
- Select a Security Profile (Paranoid, Stealth, Isolated, or Pentesting)
- Click "Create Secure VM"
- βΆ Run - Normal boot from disk
- πΏ Live - Boot from ISO (live mode)
- π Secure - Launch with security profile selection
Access the Security tab to:
- View and manage security profiles
- Toggle Tor service on/off
- Request new Tor identity
- Monitor active protections
Access the Network tab to:
- Configure network isolation mode
- Set up VPN (WireGuard/OpenVPN)
- Configure Tor settings (bridges, exit nodes)
- Enable kill switch and DNS protection
| Path | Description |
|---|---|
~/n01d-machine/vms/ |
Virtual machine disks |
~/n01d-machine/isos/ |
ISO images |
~/n01d-machine/security/ |
Security profiles |
~/n01d-machine/vpn/ |
VPN configurations |
~/n01d-machine/tor/ |
Tor configurations |
~/n01d-machine/config.json |
Main config file |
- Rust 1.70+
- Node.js 18+
- Platform-specific dependencies
# Install dependencies
sudo apt install libgtk-3-dev libwebkit2gtk-4.0-dev libappindicator3-dev librsvg2-dev
# Build
cd releases/n01d-cross-platform
cargo install tauri-cli
cargo tauri buildcd releases\n01d-cross-platform
cargo install tauri-cli
cargo tauri buildcd releases/n01d-cross-platform
cargo install tauri-cli
cargo tauri buildn01d-machine/
βββ n01d # CLI application (Python)
βββ n01d-gui # GTK GUI (Python, Linux only)
βββ n01d-icon.svg # Application icon
βββ n01d-machine.desktop # Linux desktop entry
βββ releases/
β βββ n01d-cross-platform/ # Tauri cross-platform build
β βββ public/ # Web UI
β βββ src-tauri/
β βββ src/
β β βββ main.rs # Rust backend
β β βββ security.rs # Security module
β βββ Cargo.toml
βββ .github/
βββ workflows/
β βββ release.yml # CI/CD
βββ ISSUE_TEMPLATE/ # Bug/Feature templates
- β¨ Added security profiles (Paranoid, Stealth, Isolated, Pentesting)
- β¨ Added network isolation modes
- β¨ Added Tor integration with bridge support
- β¨ Added VPN support (WireGuard, OpenVPN)
- β¨ Added kill switch and DNS leak protection
- β¨ Added Security Center UI
- β¨ Added Network Configuration UI
- π Fixed GitHub Actions workflow
- π Initial release
- VM creation, management, and deletion
- ISO browsing and quick boot
- Cross-platform support (Linux, Windows, macOS)
Contributions are welcome! Please feel free to submit a Pull Request.
See our issue templates for bug reports and feature requests.
MIT License - see LICENSE
Made with β€οΈ by NullSec Team
π Privacy is not a crime