Preparing the Guest - nkd071819/Cuckoo-V2 GitHub Wiki
Preparing the Guest
At this point you should have configured the Cuckoo host component and you should have designed and defined the number and the names of the virtual machines you are going to use for malware execution.
Now itโs time to create such machines and to configure them properly. The following documentation details the entire setup guide for Windows-based Guests. For Linux Guests, please read Installing the Linux host.