Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-virtualization
Collection of resources about Virtualization
https://github.com/Wenzel/awesome-virtualization
- Intel® 64 and IA-32 architectures software developer's manual volume 3C
- VMCS Layout
- VMX Caps
- Secure Encrypted Virutalization
- Hardware and Software Support for Virtualization
- Virtual Machines: Versatile Platforms for Systems and Processes
- Mastering KVM Virtualization
- Memory Virtualization playlist by Udacity
- Full Virtualization by Geoffrey Challen
- Xen and the Art of Virtualization by Geoffrey Challen
- Container Virtualization by Geoffrey Challen
- Open Security Training Advanced VT-x course
- From Kernel to VMM
- MMU Virtualization via Intel EPT
- Virtualization and Computing Lectures
- A comparison of software and hardware techniques for x86 virtualization by K. Adams and O. Agesen (2006)
- Bringing Virtualization to the x86 Architecture with the Original VMware Workstation by Edouard Bugnion, Scott Devine, Mendel Rosenblum, Jeremy Sugerman, And Edward Y. Wang
- The evolution of an x86 virtual machine monitor by O. Agesen, A. Garthwaite, J. Sheldon, and P. Subrahmanyam
- Formal Requirements for Virtualizable Third Generation Architectures by Gerald J. Popek & Robert P. Goldberg
- Modern Operating System 4th Edition (Chapter: Virtualization and the cloud) by Andrew Tanembaum
- Xen and the Art of Virtualization by Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield
- Understanding Full Virtualization, Paravirtualization and Hardware Assisted Virtualization by VMWare
- Dynamic Binary Translation from x86-32 code to x86-64 code for Virtualization by Yu-hsin Chen.
- MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel by Igor Korkin (2019)
- HyperDbg: Reinventing Hardware-Assisted Debugging
- The Reversing Machine: Reconstructing Memory Assumptions
- Blue Pill
- BitVisor
- Xvisor
- NOVA
- ramooflax
- TinyVM
- jailhouse
- HOSS
- Bareflank
- SimpleVisor
- HyperPlatform
- kHypervisor
- rustyvisor
- HyperBone
- VivienneVMM
- hypervisor-for-beginners
- Intel HAXM
- ksm
- crosvm
- Firecracker
- SimpleSvm
- GiantVM
- hvpp
- ACRN
- gbhv
- applepie
- boxy
- nemu
- gvisor
- NoirVisor
- rust-vmm
- MemoryRanger
- ZeldaOS.x86_64
- vbh
- HypSec
- zpp_hypervisor
- orange_slice
- cloud-hypervisor
- uhyve
- mythril
- MiniVisorPkg
- MicroV
- Zelda.RISCV
- napoca
- barbervisor
- Hedron
- KVM website
- KVM forum
- set of KVM documentations
- How VT-x, KVM and QEMU Work Together
- Xen website
- QEMU website
- The Architecture of VMware ESXi
- VirtualBox website
- VirtualBox documentation
- Hyper-V internals researches (2006-2019)
- Battle of SKM and IUM
- Ring 0 to Ring -1 Attacks
- Virtualization Based Security - Part 1: The boot process
- Virtualization Based Security - Part 2: kernel communications
- Hyper-V and its Memory Manager
- A Dive in to Hyper-V Architecture & Vulnerabilities
- Hardening Hyper-V through offensive security research - Black Hat
- First Steps in Hyper-V Research
- Growing Hypervisor 0day with Hyperseed
- VBS and VSM Internals
- Hyper-V #0x1 - Hypercalls part 1
- Hyper-V LIS
- Virtualization Documentation
- Hyper-V technet
- Hyper-V Internals
- Part 1: Basic Concepts & Configure Testing Environment
- Part 2: Entering VMX Operation
- Part 3: Setting up Our First Virtual Machine
- Part 4: Address Translation Using Extended Page Table (EPT)
- Part 5: Setting up VMCS & Running Guest Code
- Part 6: Virtualizing An Already Running System
- Part 7: Using EPT & Page-Level Monitoring Features
- Part 8: How To Do Magic With Hypervisor!
- Day 0: Virtual Environment Setup, Scripts, and WinDbg
- Day 1: Introduction to Virtualization, Type Definitions, and Support Testing
- Day 2: Entering VMX Operation, Explaining Implementation Requirements
- Day 3: The VMCS, Component Encoding, and Multiprocessor Initialization
- Day 4: VMCS Initialization, Segmentation, and Operation Visualization
- Day 5: The VM-exit Handler, Event Injection, Context Modifications, and CPUID Emulation
- Zero-Footprint Guest Memory Introspection from Xen by Mihai Dontu - [[Slides]](https://www.slideshare.net/xen_com_mgr/zero-footprint-guest-memory-introspection-from-xen) [[Update]](http://events17.linuxfoundation.org/sites/events/files/slides/Zero-Footprint%20Guest%20Memory%20Introspection%20with%20Xen.pdf)
- Hypervisor memory introspection at the next level
- Bringing Commercial Grade Virtual Machine Introspection to KVM by Mihai Donțu - [[Slides]](http://events17.linuxfoundation.org/sites/events/files/slides/Zero-Footprint%20Guest%20Memory%20Introspection%20with%20Xen.pdf)
- Hypervisor-based, hardware-assisted system monitoring
- Virtual Machine Introspection to Detect and Protect
- Hypervisor Memory Forensics - [[Slides]](http://s3.eurecom.fr/~emdel/talks/grazianolanzi_hitb.pdf)
- Who Watches The Watcher? Detecting Hypervisor Introspection from Unprivileged Guests
- DRAKVUF Black-box Binary Analysis for in-depth execution tracing of arbitrary binaries
- Patchguard: Detection of Hypervisor Based Introspection - P1
- Patchguard: Detection of Hypervisor Based Introspection - P2
- Reversing with HyperDbg (Dbg3301) - OpenSecurityTraining
- Blackhat 2010 - Hacking the Hypervisor
- Software Attacks on Hypervisor Emulation of Hardware - [[Slides]](https://www.troopers.de/downloads/troopers17/TR17_Attacking_hypervisor_through_hardwear_emulation.pdf)
- Lessons Learned from Eight Years of Breaking Hypervisors - [[Slides]](https://www.blackhat.com/docs/eu-14/materials/eu-14-Wojtczuk-Lessons-Learned-From-Eight-Years-Of-Breaking-Hypervisors.pdf)
- Attacking Hypervisors Using Firmware And Hardware - [[Slides]](http://c7zero.info/stuff/AttackingHypervisorsViaFirmware_bhusa15_dc23.pdf)
- The Arms Race Over Virtualization - [[Slides]](https://www.blackhat.com/docs/us-16/materials/us-16-Luan-Ouroboros-Tearing-Xen-Hypervisor-With-The-Snake.pdf)
- Glitches in the Matrix – Escape via NMI
- Hypervisor Vulnerability Research - State of the Art
- Virtualization under attack: Breaking out of KVM - [[Slides]](http://www.hakim.ws/DEFCON19/Speakers/Elhage/DEFCON-19-Elhage-Virtualization-Under-Attack.pdf)
- Performant Security Hardening of KVM by Steve Rutherford - [[Slides]](http://www.linux-kvm.org/images/3/3d/01x02-Steve_Rutherford-Performant_Security_Hardening_of_KVM.pdf)
- Ouroboros: Tearing Xen Hypervisor With the Snake
- Subverting the Xen hypervisor
- Preventing and Detecting Xen Hypervisor Subversions
- Bluepilling the Xen Hypervisor
- XenPwn: Breaking paravirtualized devices - [[Slide]](https://www.blackhat.com/docs/us-16/materials/us-16-Wilhelm-Xenpwn-Breaking-Paravirtualized-Devices-wp.pdf)
- Advanced Exploitation: Xen Hypervisor VM Escape
- Xen exploitation part 1: XSA-105, from nobody to root
- Xen exploitation part 2: XSA-148, from guest to host
- Cloudburst: Hacking 3D And Breaking Out Of Vmware
- The Great Escapes Of Vmware: A Retrospective Case Study Of VMWare Guest-To-Host Escape Vulnerabilities
- Out of the Truman Show: VM Escape in VMware Gracefully
- Control Register Access Exiting and Crashing VMware
- Unboxing your virtualBox - [[Slides]](https://raw.githubusercontent.com/phoenhex/files/master/slides/unboxing_your_virtualboxes.pdf)
- Breaking Out of VirtualBox through 3D Acceleration - [[Slides]](https://www.coresecurity.com/system/files/publications/2016/05/corelabs-Breaking_Out_of_VirtualBox_through_3D_Acceleration-Francisco_Falcon.pdf)
- VirtualBox VMSVGA VM Escape
- VirtualBox NAT DHCP/BOOTP server vulnerabilities
- Awesome Hyper-V Exploitation
- Security Assessment of Microsoft Hyper-V
- Ring 0 to Ring -1 Exploitation with Hyper-V IPC
- VBS and VSM Internals
- Hardening Hyper-V through offensive security research - Black Hat
- A Dive in to Hyper-V Architecture & Vulnerabilities
- Writing a Hyper-V Bridge for Fuzzing
- Fuzzing para-virtualized devices in Hyper-V
- Growing Hypervisor 0day with Hyperseed
- Breaking VSM by Attacking SecureKernel
- Wandering through the Shady Corners of VMware Workstation/Fusion
- CVE-2018-2844: From Compiler Optimization to Code Execution - VirtualBox VM Escape
- CVE-2017-3558: Oracle VM VirtualBox - Guest-to-Host Privilege Escalation via Broken Length Handling in slirp Copy
- Better slow than sorry - VirtualBox 3D acceleration considered harmful
- Analyzing a Patch of a Virtual Machine Escape on VMware
- VirtualBox 3D Acceleration: An Acceleration Attack Surface
- A bunch of Red Pills: VMware Escapes
- SSD Advisory – Oracle VirtualBox Multiple Guest to Host Escape Vulnerabilities
- Pandavirtualization: Exploiting the Xen hypervisor
- DEFCON 17: Reverse Engineering By Crayon: Hypervisor Based Malware Analysis and Visualization
- Hypervisors In Ur Toolbox: Monitoring N Controlling System Events With HyperPlatform
- How to hide a hook: A hypervisor for rootkits
Programming Languages
Keywords
hypervisor
13
virtualization
10
sandbox
4
kernel
4
vt-x
4
linux
4
rust
3
x86-64
3
virtual-machine
3
uefi
2
kvm
2
introspection
2
security
2
containers
2
windows
2
introspect
1
linux-kernel
1
reverse-engineering
1
minimalist
1
open-source
1
oversubscription
1
serverless
1
hypervisors
1
stl
1
gsl
1
cxx
1
bareflank
1
real-time
1
c
1
performance
1
microkernel
1
microhypervisor
1
cplusplus
1
aarch64
1
hyper-v
1
protection
1
riscv32
1
riscv-isa
1
riscv-emulator
1
riscv
1
risc-v
1
dynamic-binary-translation
1
intel
1
unikernel
1
hermit
1
rust-vmm
1
cloud-workloads
1
vmx
1
smp
1
hardware-assisted
1