QEMU fork
☆24Mar 20, 2026Updated this week
Alternatives and similar repositories for qemu
Users that are interested in qemu are comparing it to the libraries listed below
Sorting:
- Linux kernel source tree☆32Mar 11, 2026Updated last week
- AMD Secure Encrypted Virtualization☆361Feb 16, 2026Updated last month
- Tools, scripts, and configuration files necessary to demonstrate an end-to-end remote attestation example with SEV-SNP.☆58Jan 26, 2024Updated 2 years ago
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆73Feb 11, 2026Updated last month
- Linux SVSM (Secure VM Service Module) for secure x86 virtualization in Rust☆141Feb 1, 2024Updated 2 years ago
- go-sev-guest offers a library to wrap the /dev/sev-guest device in Linux, as well as a library for attestation verification of fundamenta…☆68Nov 19, 2025Updated 4 months ago
- AMD SEV Tool☆87Jul 5, 2023Updated 2 years ago
- Simple AMD-V (SVM) Virtualization Extensions Demo☆20Nov 7, 2017Updated 8 years ago
- AMD SEV-SNP rust utils☆16May 13, 2025Updated 10 months ago
- Confidential Containers Guest Tools and Components☆120Updated this week
- go-tdx-guest offers a library to wrap the /dev/tdx-guest device in Linux, as well as a library for attestation verification of fundamenta…☆89Mar 5, 2026Updated 2 weeks ago
- ☆28Mar 1, 2026Updated 3 weeks ago
- A Ghidra static analysis tool for locating PACMAN Gadgets☆13Sep 1, 2022Updated 3 years ago
- ☆111Aug 30, 2023Updated 2 years ago
- EVM runtime for the Filecoin Virtual Machine☆15Aug 24, 2022Updated 3 years ago
- ☆18Jul 15, 2024Updated last year
- ☆35Oct 29, 2025Updated 4 months ago
- ☆13Mar 4, 2026Updated 2 weeks ago
- Edge Gateway + Storage deal making using Delta☆11Jul 13, 2023Updated 2 years ago
- Run integrity protected workloads in a hardware based Trusted Execution Environment.☆44Feb 17, 2026Updated last month
- ☆15Apr 28, 2023Updated 2 years ago
- A Hindley-Milner(-Damas) type inference implementation in C.☆13Nov 13, 2015Updated 10 years ago
- Documentation and diagnostic utilities for running Linux perf on AMD hardware☆33Sep 18, 2020Updated 5 years ago
- ☆20Mar 3, 2026Updated 2 weeks ago
- ☆12Sep 12, 2025Updated 6 months ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆19Mar 11, 2026Updated last week
- ☆28Aug 25, 2021Updated 4 years ago
- Semzhu-Visor; a small embedded hypervisor on AArch64 on qemu☆10Apr 9, 2019Updated 6 years ago
- ☆15Jan 5, 2024Updated 2 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Reference code for creating and verifying a GCE firmware signed reference value message.☆23Nov 18, 2025Updated 4 months ago
- AkashOS is an unattended install of Ubuntu Server that will become the operating system of the machine. Akash OS will create a Kubernetes…☆13Dec 22, 2025Updated 3 months ago
- CloudFormation template for minin Ethereum crypto currency on AWS☆10May 17, 2021Updated 4 years ago
- Open Source Implemenation of Secure SEV-SNP bootup workflow☆26Nov 3, 2024Updated last year
- ☆13Mar 13, 2026Updated last week
- A command-line interface tool for creating, managing, and verifying Content Provenance and Authenticity (C2PA) manifests for machine lear…☆21Updated this week
- A test case for VFIO_PLATFORM currently based on the PL330 DMA controller. The effort on VFIO_PLATFORM has been partially funded by the S…☆13Dec 12, 2022Updated 3 years ago
- 長野高専の3J「アルゴリズムとデータ構造」後期の多倍長演算プログラム☆21Mar 1, 2018Updated 8 years ago
- RT-Hypervisor: A real-time hypervisor for automotive embedded system☆13Feb 1, 2023Updated 3 years ago