Wenzel / Awesome Virtualization
Licence: gpl-3.0
Collection of resources about Virtualization
Stars: ✭ 846
Projects that are alternatives of or similar to Awesome Virtualization
Microverse
macOS virtualization app for M1/Apple Silicon
Stars: ✭ 71 (-91.61%)
Mutual labels: virtual-machine, virtualization, hypervisor
uvmm
Virtual machine monitor for L4Re
Stars: ✭ 22 (-97.4%)
Mutual labels: virtual-machine, virtualization, hypervisor
Hdk
(unofficial) Hyper-V® Development Kit
Stars: ✭ 166 (-80.38%)
Mutual labels: virtual-machine, virtualization, hypervisor
Corium
Corium is a modern scripting language which combines simple, safe and efficient programming.
Stars: ✭ 18 (-97.87%)
Mutual labels: virtual-machine, virtualization
virtnbdbackup
Backup utiliy for Libvirt / qemu / kvm supporting incremental and differencial backups.
Stars: ✭ 62 (-92.67%)
Mutual labels: virtual-machine, virtualization
Firecracker
Secure and fast microVMs for serverless computing.
Stars: ✭ 16,826 (+1888.89%)
Mutual labels: virtual-machine, virtualization
Youtube Videos
Documentation for Techno Tim YouTube Videos
Stars: ✭ 250 (-70.45%)
Mutual labels: virtual-machine, virtualization
SelfPortal
One for all virtualization abstraction layer.
Stars: ✭ 22 (-97.4%)
Mutual labels: virtual-machine, virtualization
Learn Kvm
Qemu KVM(Kernel Virtual Machine)学习笔记
Stars: ✭ 305 (-63.95%)
Mutual labels: virtualization, hypervisor
Icebox
Virtual Machine Introspection, Tracing & Debugging
Stars: ✭ 422 (-50.12%)
Mutual labels: virtualization, hypervisor
Hypervisor
Hypervisor implementation for x86_64 ISA MIT JOS
Stars: ✭ 25 (-97.04%)
Mutual labels: virtualization, hypervisor
wiser
🐎 Extremely minimal vmm for linux written in C. Hopefully someday will spin linux-vm for you.
Stars: ✭ 249 (-70.57%)
Mutual labels: virtual-machine, hypervisor
Cc Oci Runtime
OCI (Open Containers Initiative) compatible runtime for Intel® Architecture
Stars: ✭ 418 (-50.59%)
Mutual labels: virtual-machine, virtualization
Runtime
OCI (Open Containers Initiative) compatible runtime using Virtual Machines
Stars: ✭ 588 (-30.5%)
Mutual labels: virtual-machine, virtualization
M7M01 MuEukaron
An capability-based microkernel general-purpose operating system focusing on scalability, predictability, mixed-criticality and recoverability. THIS PROJECT IS IN PREVIEW STATE CURRENTLY
Stars: ✭ 79 (-90.66%)
Mutual labels: virtualization, hypervisor
Ksm
A fast, hackable and simple x64 VT-x hypervisor for Windows and Linux. Builtin userspace sandbox and introspection engine.
Stars: ✭ 673 (-20.45%)
Mutual labels: virtualization, hypervisor
Vsock
Package vsock provides access to Linux VM sockets (AF_VSOCK) for communication between a hypervisor and its virtual machines. MIT Licensed.
Stars: ✭ 181 (-78.61%)
Mutual labels: virtual-machine, hypervisor
Invtero.net
inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspection techniques
Stars: ✭ 237 (-71.99%)
Mutual labels: virtual-machine, hypervisor
Xen Orchestra
The complete web solution to manage and backup XCP-ng and Citrix Hypervisor.
Stars: ✭ 358 (-57.68%)
Mutual labels: virtualization, hypervisor
Awesome Virtualization
A curated list of awesome resources about virtualization.
Table of Contents
- Chronology
- Documentation
- Books
- Courses
- Papers
- Research Projects
- Mainstream Hypervisors Documentation
- Hypervisor Development
- Virtual Machine Introspection
- Attacking Hypervisors
- Malware Analysis
Chronology
- 2005-November-13: Intel
VT-x
released onPentium 4
(Model662
and672
) processors - 2006-May-23: AMD
AMD-V
released onOrleans
andWindsor
processors - 2007-September-10 : AMD
Barcelona
addsRVI
(Rapid Virtualization Indexing) a.k.a (Nested Page Tables) a.k.a (SLAT
) - 2008-November: Intel
Nehalem
-
EPT
(Extended Page Tables) a.k.a (SLAT
) -
VPID
(Virtual Processor ID)
-
- 2010-January-7: Intel
Westmere
addsunrestricted guests
a.k.a (Real Mode Support) - 2013-June-4: Intel
haswell
:VMCS Shadowing
-
VMFUNC
,#VE
andEPTP
switching
- 2017
- June-21: AMD
EPYC
adds suport forSecure Encrypted Virtualization
(SEV) - AMD documents
Encrypted State
(SEV-ES)
- June-21: AMD
- 2019
- AMD documents
Secure Nested Paging
(SEV-SNP) - August-1: Intel
Ice Lake
-
EPT SPP
(EPT-Based Sub-Page Write Protection) - Virtualizing
Intel Processor Trace
output buffer using EPT
-
- AMD documents
- 2020-March: Intel documents
Hypervisor-Managed Linear Address Translation
(HLAT)
Documentation
Intel
AMD
Books
Courses
- Memory Virtualization playlist by Udacity
- Full Virtualization by Geoffrey Challen
- Xen and the Art of Virtualization by Geoffrey Challen
- Container Virtualization by Geoffrey Challen
- Open Security Training Advanced VT-x course
- From Kernel to VMM
- MMU Virtualization via Intel EPT
Papers
- A comparison of software and hardware techniques for x86 virtualization by K. Adams and O. Agesen (2006)
- Bringing Virtualization to the x86 Architecture with the Original VMware Workstation by Edouard Bugnion, Scott Devine, Mendel Rosenblum, Jeremy Sugerman, And Edward Y. Wang
- The evolution of an x86 virtual machine monitor by O. Agesen, A. Garthwaite, J. Sheldon, and P. Subrahmanyam
- Formal Requirements for Virtualizable Third Generation Architectures by Gerald J. Popek & Robert P. Goldberg
- Modern Operating System 4th Edition (Chapter: Virtualization and the cloud) by Andrew Tanembaum
- Xen and the Art of Virtualization by Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield
- Understanding Full Virtualization, Paravirtualization and Hardware Assisted Virtualization by VMWare
- Dynamic Binary Translation from x86-32 code to x86-64 code for Virtualization by Yu-hsin Chen.
- MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel by Igor Korkin (2019)
Research Projects
- 2008: BitVisor
- 2010: Xvisor
- 2011:
- 2013: jailhouse
- 2014: HOSS
- 2015: Bareflank
- 2016:
- 2017:
- 2018:
- 2019:
- 2020:
Mainstream Hypervisors Documentation
KVM
Xen
QEMU
VMware
VirtualBox
Hyper-V
- Hyper-V internals researches (2006-2019)
- 2015:
- 2017:
- 2018:
- 2019:
- 2020:
- Virtualization Documentation
- Hyper-V technet
- Hyper-V Internals
Hypervisor Development
Hypervisor From Scratch
- Part 1: Basic Concepts & Configure Testing Environment
- Part 2: Entering VMX Operation
- Part 3: Setting up Our First Virtual Machine
- Part 4: Address Translation Using Extended Page Table (EPT)
- Part 5: Setting up VMCS & Running Guest Code
- Part 6: Virtualizing An Already Running System
- Part 7: Using EPT & Page-Level Monitoring Features
- Part 8: How To Do Magic With Hypervisor!
5 Days to Virtualization
- Day 0: Virtual Environment Setup, Scripts, and WinDbg
- Day 1: Introduction to Virtualization, Type Definitions, and Support Testing
- Day 2: Entering VMX Operation, Explaining Implementation Requirements
- Day 3: The VMCS, Component Encoding, and Multiprocessor Initialization
- Day 4: VMCS Initialization, Segmentation, and Operation Visualization
- Day 5: The VM-exit Handler, Event Injection, Context Modifications, and CPUID Emulation
Virtual Machine Introspection
- Zero-Footprint Guest Memory Introspection from Xen by Mihai Dontu - [Slides] [Update]
- Hypervisor memory introspection at the next level
- Bringing Commercial Grade Virtual Machine Introspection to KVM by Mihai Donțu - [Slides]
- Hypervisor-based, hardware-assisted system monitoring
- Virtual Machine Introspection to Detect and Protect
- Hypervisor Memory Forensics - [Slides]
- Who Watches The Watcher? Detecting Hypervisor Introspection from Unprivileged Guests
- DRAKVUF Black-box Binary Analysis for in-depth execution tracing of arbitrary binaries
- Patchguard: Detection of Hypervisor Based Introspection - P1
- Patchguard: Detection of Hypervisor Based Introspection - P2
Attacking Hypervisors
- Blackhat 2010 - Hacking the Hypervisor
- Software Attacks on Hypervisor Emulation of Hardware - [Slides]
- Lessons Learned from Eight Years of Breaking Hypervisors - [Slides]
- Attacking Hypervisors Using Firmware And Hardware - [Slides]
- The Arms Race Over Virtualization - [Slides]
- Glitches in the Matrix – Escape via NMI
- Hypervisor Vulnerability Research - State of the Art
KVM
- Virtualization under attack: Breaking out of KVM - [Slides]
- Performant Security Hardening of KVM by Steve Rutherford - [Slides]
Xen
- Ouroboros: Tearing Xen Hypervisor With the Snake
- Subverting the Xen hypervisor
- Preventing and Detecting Xen Hypervisor Subversions
- Bluepilling the Xen Hypervisor
- XenPwn: Breaking paravirtualized devices - [Slide]
- Advanced Exploitation: Xen Hypervisor VM Escape
- Xen exploitation part 1: XSA-105, from nobody to root
- Xen exploitation part 2: XSA-148, from guest to host
VMware
- Cloudburst: Hacking 3D And Breaking Out Of Vmware
- The Great Escapes Of Vmware: A Retrospective Case Study Of VMWare Guest-To-Host Escape Vulnerabilities
- Out of the Truman Show: VM Escape in VMware Gracefully
- Control Register Access Exiting and Crashing VMware
VirtualBox
- Unboxing your virtualBox - [Slides]
- Breaking Out of VirtualBox through 3D Acceleration - [Slides]
- VirtualBox VMSVGA VM Escape
- VirtualBox NAT DHCP/BOOTP server vulnerabilities
Hyper-V
- Ring 0 to Ring -1 Exploitation with Hyper-V IPC
- Hardening Hyper-V through offensive security research - Black Hat
- Growing Hypervisor 0day with Hyperseed
- A Dive in to Hyper-V Architecture & Vulnerabilities
- Security Assessment of Microsoft Hyper-V
- VBS and VSM Internals
- Fuzzing para-virtualized devices in Hyper-V
- Writing a Hyper-V Bridge for Fuzzing
- Awesome Hyper-V Exploitation
CVEs
- Wandering through the Shady Corners of VMware Workstation/Fusion
- CVE-2018-2844: From Compiler Optimization to Code Execution - VirtualBox VM Escape
- CVE-2017-3558: Oracle VM VirtualBox - Guest-to-Host Privilege Escalation via Broken Length Handling in slirp Copy
- Better slow than sorry - VirtualBox 3D acceleration considered harmful
- Analyzing a Patch of a Virtual Machine Escape on VMware
- VirtualBox 3D Acceleration: An Acceleration Attack Surface
- A bunch of Red Pills: VMware Escapes
- SSD Advisory – Oracle VirtualBox Multiple Guest to Host Escape Vulnerabilities
- Pandavirtualization: Exploiting the Xen hypervisor
Malware analysis
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].