Home

Awesome

Sandboxie Plus / Classic

Plus license Classic license GitHub Release GitHub Pre-Release GitHub Build Status GitHub Codespell Status Gurubase

Roadmap Join our Discord Server

System requirementsRelease notesContribution guidelinesSecurity policyCode of Conduct
Windows 7 or higher, 32-bit or 64-bit.CHANGELOG.mdCONTRIBUTING.mdSECURITY.mdCODE_OF_CONDUCT.md

Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying local & mapped drives or the Windows registry. An isolated virtual environment allows controlled testing of untrusted programs and web surfing.<br>

Sandboxie allows you to create virtually unlimited sandboxes and run them alone or simultaneously to isolate programs from the host and each other, while also allowing you to run as many programs simultaneously in a single box as you wish.

Note: This is a community fork that took place after the release of the Sandboxie source code and not the official continuation of the previous development (see the project history and #2926).

โฌ Download

Latest Release

๐Ÿš€ Features

Sandboxie is available in two editions, Plus and Classic. They both share the same core components, this means they have the same level of security and compatibility. What's different is the availability of features in the user interface.

Sandboxie Plus has a modern Qt-based UI, which supports all new features that have been added since the project went open source:

More features can be spotted by finding the sign = through the shortcut key Ctrl+F in the CHANGELOG.md file.

Sandboxie Classic has the old no longer developed MFC-based UI, hence it lacks native interface support for Plus features. Although some of the missing features can be configured manually in the Sandboxie.ini configuration file or even replaced with custom scripts, the Classic edition is not recommended for users who want to explore the latest security options.

๐Ÿ“š Documentation

A GitHub copy of the Sandboxie documentation is currently maintained, although more volunteers are needed to keep it updated with the new changes. It is recommended to also check the following labels to track current issues: Labels ยท sandboxie-plus/Sandboxie.

A partial archive of the old Sandboxie forum that was previously maintained by Invincea is still available. If you need to find something specific, it is possible to use the following search query: site:https://sandboxie-website-archive.github.io/www.sandboxie.com/old-forums/.

๐Ÿš€ Useful tools for Sandboxie

Sandboxie's functionality can be enhanced with specialized tools like the following:

๐Ÿ“Œ Project history

TimelineMaintainer
2004 - 2013Ronen Tzur
2013 - 2017Invincea Inc.
2017 - 2020Sophos Group plc
8 April 2020 - open-source codeSophos Ltd.
9 April 2020 onwards - project forkDavid Xanatos

See the current roadmap.

๐Ÿ“Œ Project support / sponsorship

<img align="left" height="64" width="64" src="./.github/images/binja-love.png"> Thank you Vector 35 for providing a Binary Ninja license to help with reverse engineering. <br> Binary Ninja is a multi-platform interactive disassembler, decompiler, and binary analysis tool for reverse engineers, malware analysts, vulnerability researchers, and software developers.<br> <br> <img align="left" height="64" width="64" src="./.github/images/Icons8_logo.png">Thank you Icons8 for providing icons for the project. <br> <br> <br>

๐Ÿค Support the project

If you find Sandboxie useful, then feel free to contribute through our Contribution guidelines.

๐Ÿ“‘ Helpful Contributors

๐ŸŒ Translators

All translators are encouraged to look at the Localization notes and tips before sending a translation.