A hypervisor, also known as a virtual machine monitor (VMM), is a software, firmware, or hardware component that enables the creation and management of virtual machines (VMs) on a physical host machine. It allows multiple operating systems (OS) or virtual machines to run concurrently on a single physical server, effectively partitioning the available resources such as CPU, memory, storage, and networking.
There are two main types of hypervisors:
-
Type 1 Hypervisor (Bare-Metal Hypervisor): It runs directly on the host's hardware and provides a layer of abstraction between the physical hardware and the virtual machines. Examples of type 1 hypervisors include Microsoft Hyper-V, VMware ESXi, and Citrix XenServer.
-
Type 2 Hypervisor (Hosted Hypervisor): It runs as a software layer on top of an existing operating system. The underlying operating system provides hardware abstraction, and the hypervisor manages the virtual machines. Examples of type 2 hypervisors include Oracle VirtualBox and VMware Workstation.
Hypervisors play a crucial role in server virtualization, allowing organizations to consolidate their physical infrastructure, improve resource utilization, and simplify the management of multiple virtual machines. They also enable the creation of isolated and independent virtual environments for testing, development, and deployment of applications without impacting the underlying host system.
- RayanFam - Hyper visor from scratch
- 7 Days to Virtualization: A Series on Hypervisor Development
- NixHacker developing a hyper visor from scratch
- Intro to Hypervisors for Game Hacking
- Build a Hypervisor from scratch in rust
- Create a minmilastic Virtual machine
- Hyper-Visor for beginners
- Creating a VM for fun
- Introduction to VirtualBox security research
- AMD-V Hyper visor development
- Hyper-V attack surface
- Building a minimalstic Virtual machine
- Write your own VM Justin Meiners
- CPU Emulation book
- HV - Internals
- Internals information about Hyper-V
- Virtualization Internals Part 1 - Intro to Virtualization
- Virtualization Internals Part 2 - VMWare and Virtualization using Binary Translation
- Virtualization Internals Part 3 - Xen and Paravirtualization
- Virtual machine in C
- Debugging Hyper-V for vulnerability research
- QEMU Internals
- Light-weight Hyper-visor SDK
- Hyper-V solution for x86 processors
- Windows Hyper-visor platform docs/API
- Building the Linux ARM Hypervisor
- Hyper-visor driver for AMD processors
- ACRN Hypervisors
- Kraken A simple x86_64 AMD-V Hyper visor
- tiniest x86-64 Linux emulator
- Light-weight Intel x64/VT-x hypervisor written in C++
- Hyper-V hacking framework - Voyager
- Playground for generating virtual machine protected x64 assembly
- AMD Hypervisor
- SimpleVisor
- Detecting VMware by reading invalid msr
- Windows Kernel
- Revisiting hardware-assisted page walks for virtualized systems
- VM Forking & Hypervisor-Based Fuzzing with Xen
- Verliog and state machines
- Build your own CPU
- Standa - Note , Decent blog posts related to Hyper-visors
- V.V space - Blog posts
- Chuong Security blog
- Securing VMware
- LKVM escape
- VMProtect 2 - Detailed Analysis of the Virtual Machine Architecture
- A Fuzzer for Hyper-V devices slides
- Zero-day engineering Guide
- Hyper-V RCE research
- VBOX Fuzzing
- The case for critical virtual technology
- Boot drive encryption security on windows
- Build your first LLVM Obfuscator
- VX-Underground - Papers on Hyper-V
- iPhone 11 emulated on QEMU
- VMprotect de virtualization
- What is virtualization and what are its Types
- Huawei Security Hypervisor Vulnerability
- Intel EPT Technical details
- Apple data formats
- Exploiting windows vulnerabilities with Hyper-V
- Hypervisor Detection with SystemHypervisorDetailInformation
- Static devirtualization series
- The new Hyper-V attack surface
- oracle-virtualbox-vhwa-use-after-free-privilege-escalation-vulnerability
- Writing a simple 16 bit VM in less than 125 lines of C
- Modern VMWARE Exploitation Techniques
- Writing a simple 16 bit VM in less than 125 lines of C
- Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991
- Hyper-V Related work
- AMD-V Hypervisor dev
- How Aether visor works under the hood
- Voyager - A Hyper-V Hacking Framework
- Building a Language VM
- Setting up an x86 CPU in 64-bit mode
- Dragon Slaying Guide:BugHuntingInVMware Device Virtualization
- Hyper-V internals researches history (2006-2024)
- intel vt-x type 2 hypervisor
- Debugging the windows hypervisor
- Oracle VM VirtualBox 7.0.10 r158379 Escape
- PS5 Hypervisor exploit + Slides
- D1 - Dragon Slaying Guide: Bug Hunting In VMware Device Virtualization
- Coding a virtual machine from scratch in C
- An overview of Hypervisor implants