Skip to content

Rapidly initialize Windows Sanbox for malware analysis and reverse engineering

License

Notifications You must be signed in to change notification settings

jm33-m0/windows-sandbox-init

Repository files navigation

Windows Sandbox Init Script

What it does

This project aims to automatically configure a Windows Sanbox for malware analysis with offline software packages.

How to use

Make sure you have Windows Sandbox enabled.

Customize packages.json if you need to remove or add packages.

  1. Run download_pkgs.ps1 to download all packages for offline use, and update the checksums for later verification.
  2. Start start.wsb.
  3. Generally it should be done in 2 minutes.

Note:

  1. Use start.wsb whenever possible
  2. If Internet is needed, use danger_zone_start_with_internet.wsb, ideally in an isolated physical network
  3. If you just need to capture some network traffic without the need of Internet connectivity, the default start.wsb should be sufficient, just capture traffic on the TUN device

Screenshots

win-sandbox.mp4

tools