sandboxie-plus / Sandboxie

Sandboxie Plus & Classic
https://Sandboxie-Plus.com
GNU General Public License v3.0
12.79k stars 1.43k forks source link

Sandboxie Plus / Classic

Plus license Classic license GitHub Release GitHub Pre-Release GitHub Build Status GitHub Codespell Status

Join our Discord Server

System requirements Release notes Contribution guidelines Security policy Code of Conduct
Windows 7 or higher, 32-bit or 64-bit. CHANGELOG.md CONTRIBUTING.md SECURITY.md CODE_OF_CONDUCT.md

Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying local & mapped drives or the Windows registry. An isolated virtual environment allows controlled testing of untrusted programs and web surfing.

Sandboxie allows you to create virtually unlimited sandboxes and run them alone or simultaneously to isolate programs from the host and each other, while also allowing you to run as many programs simultaneously in a single box as you wish.

Note: This is a community fork that took place after the release of the Sandboxie source code and not the official continuation of the previous development (see the project history).

⏬ Download

Latest Release

πŸš€ Features

Sandboxie is available in two editions, Plus and Classic. They both share the same core components, this means they have the same level of security and compatibility. What's different is the availability of features in the user interface.

Sandboxie Plus has a modern Qt-based UI, which supports all new features that have been added since the project went open source:

More features can be spotted by finding the sign = through the shortcut key Ctrl+F in the CHANGELOG.md file.

Sandboxie Classic has the old no longer developed MFC-based UI, hence it lacks native interface support for Plus features. Although some of the missing features can be configured manually in the Sandboxie.ini configuration file or even replaced with custom scripts, the Classic edition is not recommended for users who want to explore the latest security options.

πŸ“š Documentation

A GitHub copy of the Sandboxie documentation is currently maintained, although more volunteers are needed to keep it updated with the new changes. We recommend to check also the following labels in this repository:

future development | feature requests | documentation | build issues | incompatibilities | known issues | regressions | workaround | help wanted | more...

A partial archive of the old Sandboxie forum that was previously maintained by Invincea is still available. If you need to find something specific, it is possible to use the following search query: site:https://sandboxie-website-archive.github.io/www.sandboxie.com/old-forums/

πŸš€ Useful tools for Sandboxie

Sandboxie's functionality can be enhanced with specialized tools like the following:

πŸ“Œ Project history

Timeline Maintainer
2004 - 2013 Ronen Tzur
2013 - 2017 Invincea Inc.
2017 - 2020 Sophos Group plc
Open-source code Tom Brown
2020 onwards David Xanatos (Roadmap)

πŸ“Œ Project support / sponsorship

Thank you Vector 35 for providing a Binary Ninja license to help with reverse engineering.
Binary Ninja is a multi-platform interactive disassembler, decompiler, and binary analysis tool for reverse engineers, malware analysts, vulnerability researchers, and software developers.

Thank you Icons8 for providing icons for the project.


🀝 Support the project

If you find Sandboxie useful, then feel free to contribute through our Contribution guidelines.

πŸ“‘ Helpful Contributors

🌏 Translators

All translators are encouraged to look at the Localization notes and tips before sending a translation.