Skip to content

βš”οΈπŸ’» The most comprehensive resource for Virtualization with a focus on Cybersecurity, Learn, exploit, read, and create let's make the industry safer by sharing and learning.βš”οΈπŸ’»

License

Notifications You must be signed in to change notification settings

husseinmuhaisen/Hypervisor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

20 Commits
Β 
Β 
Β 
Β 

Repository files navigation

β„οΈβš”οΈ The most comprehensive repository on Virtualization Cybersecurity edition βš”οΈβ„οΈ

Hyper-visor

A hypervisor, also known as a virtual machine monitor (VMM), is a software, firmware, or hardware component that enables the creation and management of virtual machines (VMs) on a physical host machine. It allows multiple operating systems (OS) or virtual machines to run concurrently on a single physical server, effectively partitioning the available resources such as CPU, memory, storage, and networking.

There are two main types of hypervisors:

  1. Type 1 Hypervisor (Bare-Metal Hypervisor): It runs directly on the host's hardware and provides a layer of abstraction between the physical hardware and the virtual machines. Examples of type 1 hypervisors include Microsoft Hyper-V, VMware ESXi, and Citrix XenServer.

  2. Type 2 Hypervisor (Hosted Hypervisor): It runs as a software layer on top of an existing operating system. The underlying operating system provides hardware abstraction, and the hypervisor manages the virtual machines. Examples of type 2 hypervisors include Oracle VirtualBox and VMware Workstation.

Hypervisors play a crucial role in server virtualization, allowing organizations to consolidate their physical infrastructure, improve resource utilization, and simplify the management of multiple virtual machines. They also enable the creation of isolated and independent virtual environments for testing, development, and deployment of applications without impacting the underlying host system.

Hype

😁 Awesome Repos 😁

  1. Awesome Virtualization
  2. Awesome Hyper-V exploitation
  3. Awesome Vulnerability research

πŸ“– Books πŸ“–

  1. Virtual Machines: Versatile Platforms for Systems and Processes
  2. Micro Kernel Book

πŸ›£οΈ Learning path-ways πŸ›£οΈ

  1. RayanFam - Hyper visor from scratch
  2. 7 Days to Virtualization: A Series on Hypervisor Development
  3. NixHacker developing a hyper visor from scratch
  4. Intro to Hypervisors for Game Hacking
  5. Build a Hypervisor from scratch in rust
  6. Create a minmilastic Virtual machine
  7. Hyper-Visor for beginners
  8. Creating a VM for fun
  9. Introduction to VirtualBox security research
  10. AMD-V Hyper visor development
  11. Hyper-V attack surface
  12. Building a minimalstic Virtual machine

πŸ•ΈοΈ Internals πŸ•ΈοΈ

  1. HV - Internals
  2. Internals information about Hyper-V
  3. Virtualization Internals Part 1 - Intro to Virtualization
  4. Virtualization Internals Part 2 - VMWare and Virtualization using Binary Translation
  5. Virtualization Internals Part 3 - Xen and Paravirtualization
  6. Virtual machine in C
  7. Debugging Hyper-V for vulnerability research

πŸ”— HyperVisors πŸ”—

  1. Light-weight Hyper-visor SDK
  2. Hyper-V solution for x86 processors
  3. Windows Hyper-visor platform docs/API
  4. Building the Linux ARM Hypervisor
  5. Hyper-visor driver for AMD processors
  6. ACRN Hypervisors
  7. Kraken A simple x86_64 AMD-V Hyper visor
  8. tiniest x86-64 Linux emulator
  9. Light-weight Intel x64/VT-x hypervisor written in C++
  10. Hyper-V hacking framework - Voyager
  11. Playground for generating virtual machine protected x64 assembly
  12. AMD Hypervisor

πŸ‘½ Miscellaneous πŸ‘½

  1. Detecting VMware by reading invalid msr
  2. Windows Kernel
  3. Revisiting hardware-assisted page walks for virtualized systems
  4. VM Forking & Hypervisor-Based Fuzzing with Xen
  5. Verliog and state machines
  6. Build your own CPU
  7. Standa - Note , Decent blog posts related to Hyper-visors
  8. V.V space - Blog posts
  9. Chuong Security blog
  10. Securing VMware
  11. LKVM escape
  12. VMProtect 2 - Detailed Analysis of the Virtual Machine Architecture
  13. A Fuzzer for Hyper-V devices slides
  14. Zero-day engineering Guide
  15. Hyper-V RCE research
  16. VBOX Fuzzing
  17. The case for critical virtual technology
  18. Boot drive encryption security on windows
  19. Build your first LLVM Obfuscator
  20. VX-Underground - Papers on Hyper-V
  21. iPhone 11 emulated on QEMU
  22. VMprotect de virtualization
  23. What is virtualization and what are its Types
  24. Huawei Security Hypervisor Vulnerability
  25. Intel EPT Technical details
  26. Apple data formats
  27. Exploiting windows vulnerabilities with Hyper-V
  28. Hypervisor Detection with SystemHypervisorDetailInformation
  29. Static devirtualization series
  30. The new Hyper-V attack surface
  31. oracle-virtualbox-vhwa-use-after-free-privilege-escalation-vulnerability
  32. Writing a simple 16 bit VM in less than 125 lines of C
  33. Modern VMWARE Exploitation Techniques
  34. Writing a simple 16 bit VM in less than 125 lines of C
  35. Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991
  36. Hyper-V Related work
  37. AMD-V Hypervisor dev
  38. How Aether visor works under the hood

About

βš”οΈπŸ’» The most comprehensive resource for Virtualization with a focus on Cybersecurity, Learn, exploit, read, and create let's make the industry safer by sharing and learning.βš”οΈπŸ’»

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages