In this comprehensive exploration, we delve into the intricate world of Hyper-V, showcasing a collection of significant work and research dedicated to understanding and enhancing the security of Microsoft’s Hyper-V hypervisor.
From detailed proof-of-concept exploits to advanced debugging techniques, this article highlights the critical vulnerabilities discovered and the innovative tools developed for hypervisor research and fuzzing.
Join us as we navigate through the complexities of Hyper-V security, shedding light on its most pivotal aspects.
This repository contains some of the Hyper-V related work I did in the past…
My code from the “Inside Hyper-V” of the Gray Hat Hacking book (6th edition).
Original repository
Includes a framework that can be used to perform hypervisor research/fuzzing and hyper-v specific code (hypercalls, MSRs, VMBus communication).
Windbg script that can be used when debugging hvix64
and provides the following features:
!brexit conditions
.conditions
is a in the form condition1 condition2 .. conditionN
.VM_EXIT_REASON
)==
, !=
, <=
, >=
, <
, >
.Proof of concept for Hyper-V stack overflow bug (hvix64).
Proof of concept for Hyper-V NULL deref bug (hvix64).
Proof of concept for Hyper-V type confusion bug (hvix64).
Proof of concept for Hyper-V arbitrary memory read bug (vmswitch).
SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze…
The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research,…
The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more…
The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting…
AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It…
Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to…