Dismiss this notice
Ant Download Manager Christmas 2020 Giveaway - https://www.geeks.fyi/showthread.php?tid=13686

Dismiss this notice
Macrium Reflect Home Edition Christmas 2020 Giveaway - https://www.geeks.fyi/showthread.php?tid=13685

Dismiss this notice
HitmanPro.Alert Christmas 2020 Giveaway - https://www.geeks.fyi/showthread.php?tid=13684

Dismiss this notice
VoodooShield PRO Christmas 2020 Giveaway - https://www.geeks.fyi/showthread.php?tid=13689

Dismiss this notice
NoVirusThanks OSArmor v1.5 Christmas 2020 Giveaway - https://www.geeks.fyi/showthread.php?tid=13758

Dismiss this notice
Revo Uninstaller Pro 4 Christmas 2020 Giveaway - https://www.geeks.fyi/showthread.php?tid=13688

Dismiss this notice
CheckMAL's AppCheck Pro Christmas 2020 Giveaway - https://www.geeks.fyi/showthread.php?tid=13690

Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Sandboxie Plus (open source fork of Sandboxie)
#11
Information 
Quote:Sandboxie Plus 5.45.0:

Download Page & Changelog
Download | 32-Bit
Download | 64-Bit
Download | 32-Bit Plus
Download | 64-Bit Plus
[-] The following 1 user Likes harlan4096's post:
  • silversurfer
Reply
#12
Information 
Quote:Release v0.5.2 / 5.45.1

This is a maintenance release it does not bring any major new features but resolves a myriad of various bugs including a BSOD issue when "Core isolation" was enabled and a major compatibility bug with windows 10 build 2004 and later.

It also brings a few minor +UI Improvements and an entirely new set of Icons.

For Windows 7 unfortunately the signing process did not returned a working driver, a solution is being worked on.

Therefor, for the time being please download the "Provisional Windows 7 Drivers.zip" package and provide the driver to the setup when prompted for.

If you have issues with an update installation, just uninstall the previous version keeping the sandboxie.ini and reinstall the new build.

Change Log

Added
  • added advanced new box creation dialog to sandman ui
  • added show/hide tray context menu entry
  • added refresh button to file recovery dialog
  • added mechanism to load icons from {install-dir}/Icons/{icon}.png for UI customization
  • added tray indicator to show disabled forced program status in the sandman ui
  • added program name suggestions to box options in sandman ui
  • added saving of column sizes in the options window
Changed
  • reorganized the advanced box options a bit
  • changed icons (thanks Valinwolf for picking the new once)
  • updated Template.ini (thanks isaak654)
  • increates max value for disable forced process time in sandman ui
Fixed
  • fixed BSOD introduced in 5.45.0 when using windows 10 "Core isolation"
  • fixed minor issue with lingering/leader processes
  • fixed menu issue in sandman ui
  • fixed issue with stop behavioure page in sandman ui
  • fixed issue with Plus installer not displaying kmdutil window
  • fixed sandman UI saving ui settings on windows shutdown
  • fixed issue with Plus installer autorun
  • fixed issue with legacy installer not removing all files
  • fixed a driver compatybility issue with windows 20H1 and later
    -- this solves "stop pending", line messager hanging and other issues...
  • fixed quick recovery issue in SbieCtrl.exe introduced in 5.45.0
  • fixed issue advanced hide process settings, not saving
  • fixed some typos in the UI (thanks isaak654)
  • fixed issue with GetRawInputDeviceInfo failing when boxed processes are put in a job object
    -- this fix resolves isses with CP2077 andother PC Games not getting keyboard input (thanks Rostok)
  • fixed failing ClipCursor wont longer span the message log
  • fixed issue with adding recovery folders in sandman ui
  • fixed issue with office 2019 template when using a non default sbie install location
  • fixed issue settign last access atribute on sandboxed folders
  • fixed issue with process start signal
Provisional.Windows.7.Drivers.zip 321 KB
Sandboxie-Plus-Portable-v0.5.2.rar 25.9 MB
Sandboxie-Plus-v0.5.2-LangPack+Patch.zip 969 KB
Sandboxie-Plus-x64-v0.5.2.exe 14.6 MB
Sandboxie-Plus-x86-v0.5.2.exe 12.5 MB
SandboxieInstall32-v5.45.1.exe 2.26 MB
SandboxieInstall64-v5.45.1.exe 2.77 MB
Reply
#13
Information 
Quote:Sandboxie Plus 5.45.2:

Homepage
Download Page & Changelog
Download | 32-Bit
Download | 64-Bit
Download | 32-Bit Plus
Download | 64-Bit Plus
[-] The following 2 users Like harlan4096's post:
  • Mohammad.Poorya, silversurfer
Reply
#14
Information 
Quote:Sandboxie Plus v0.5.3 / 5.45.3:

Homepage
Download Page & Changelog
Download | 32-Bit
Download | 64-Bit
Download | 32-Bit Plus
Download | 64-Bit Plus
[-] The following 2 users Like harlan4096's post:
  • Decimuss, silversurfer
Reply
#15
Quote:Sandboxie v0.5.4 / 5.46.0

ChangeLog
Added

 
  • Sandboxie now strips particularly problematic privileges from sandboxed system tokens
    -- with those a process could atempt to bypass the sandbox isolation (thanks Diversenok)
    -- old legacy behavior can be enabled with "StripSystemPrivileges=n" (absolutely NOT Recommended)
  • added new isolation options "ClosePrintSpooler=y" and "OpenSmartCard=n"
    -- those resources are open by default but for a hardened box its desired to close them
  • added print spooler filter to prevent printers from being set up outside the sandbox
    -- the filter can be disabled with "OpenPrintSpooler=y"
  • added overwrite prompt when recovering an already existing file
  • added "StartProgram=", "StartService=" and "AutoExec=" options to the SandMan UI
  • added more compatybility templates (thanks isaak654)
Changed
 
  • Changed Emulated SCM behavior, boxed services are no longer by default started as boxed system
    -- use "RunServicesAsSystem=y" to enable the old legacy behavior
    -- Note: sandboxed services with a system token are still sandboxed and restricted
    -- However not granting them a system token in the first place removes possible exploit vectors
    -- Note: this option is not compatible with "ProtectRpcSs=y" and takes precedence!
  • Reworked dynamic IPC port handling
  • Improved Resource Monitor status strings
Fixed
 
  • fixed a critical issue that allowed to create processes outside the sandbox (thanks Diversenok)
  • fixed issues with dynamic IPC port handling that allowed to bypass IPC isolation
  • fixed issue with ipc tracing
  • fixed CVE-2019-13502 "\RPC Control\LSARPC_ENDPOINT" is now filtered by the driver (thanks Diversenok)
    -- this allowed some system options to be changed, to disable filtering use "OpenLsaEndpoint=y"
  • fixed hooking issues SBIE2303 with chrome, edge and possibly others
  • fixed failed check for running processes when performing snapshot operations
  • fixed some box option checkboxes were not properly initialized
  • fixed unavailable options are not properly disabled when sandman is not connected to the driver
  • fixed MSI instalelr issue, not being able to create "C:\Config.Msi" folder on windows 20H2
  • added missing localization to generic list commands
  • fixed issue with "iconcache_*" when runngin sandboxed explorer
  • fixed more issues with groups
Homepage
Download page & Changelog
Download / 64-Bit
Download / 32-Bit
Download  / 32-Bit Plus
Download / 64-Bit Plus
[-] The following 2 users Like Decimuss's post:
  • harlan4096, silversurfer
Reply
#16
Information 
Quote:Urgent security fixes (thanks @diversenok)

Build 5.46.0 resolves many box isolation issues some of them critical that could allow rogue applications to escape the sandbox. It is highly advised to upgrade quickly to the new builds. For further details please review the change log below.

If you have issues with an update installation, just uninstall the previous version keeping the sandboxie.ini and reinstall the new build.

Hotfix Changelog

Added
  • added "RunServiceAsSystem=..." allows specific named services to be ran as system
Changed
  • refactored some code around SCM access
Fixed
  • fixed a crash issue in SbieSvc.exe introduced with the last build
  • fixed issue with sandman ui update check
Removed
  • removed "ProtectRpcSs=y" due to incompatybility with new isolation defaults
Release Changelog

Added
  • Sandboxie now strips particularly problematic privileges from sandboxed system tokens
    -- with those a process could atempt to bypass the sandbox isolation (thanks Diversenok)
    -- old legacy behavior can be enabled with "StripSystemPrivileges=n" (absolutely NOT Recommended)
  • added new isolation options "ClosePrintSpooler=y" and "OpenSmartCard=n"
    -- those resources are open by default but for a hardened box its desired to close them
  • added print spooler filter to prevent printers from being set up outside the sandbox
    -- the filter can be disabled with "OpenPrintSpooler=y"
  • added overwrite prompt when recovering an already existing file
  • added "StartProgram=", "StartService=" and "AutoExec=" options to the SandMan UI
  • added more compatybility templates (thanks isaak654)
Changed
  • Changed Emulated SCM behavior, boxed services are no longer by default started as boxed system
    -- use "RunServicesAsSystem=y" to enable the old legacy behavior
    -- Note: sandboxed services with a system token are still sandboxed and restricted
    -- However not granting them a system token in the first place removes possible exploit vectors
    -- Note: this option is not compatible with "ProtectRpcSs=y" and takes precedence!
  • Reworked dynamic IPC port handling
  • Improved Resource Monitor status strings
Fixed
  • fixed a critical issue that allowed to create processes outside the sandbox (thanks Diversenok)
  • fixed issues with dynamic IPC port handling that allowed to bypass IPC isolation
  • fixed issue with ipc tracing
  • fixed CVE-2019-13502 "\RPC Control\LSARPC_ENDPOINT" is now filtered by the driver (thanks Diversenok)
    -- this allowed some system options to be changed, to disable filtering use "OpenLsaEndpoint=y"
  • fixed hooking issues SBIE2303 with chrome, edge and possibly others
  • fixed failed check for running processes when performing snapshot operations
  • fixed some box option checkboxes were not properly initialized
  • fixed unavailable options are not properly disabled when sandman is not connected to the driver
  • fixed MSI instalelr issue, not being able to create "C:\Config.Msi" folder on windows 20H2
  • added missing localization to generic list commands
  • fixed issue with "iconcache_*" when runngin sandboxed explorer
  • fixed more issues with groups
Download
[-] The following 2 users Like harlan4096's post:
  • Decimuss, silversurfer
Reply
#17
Information 
Quote:Hotfix2 (5.46.2) ChangelogAdded
  • added "CallTrace=*" to log all system calls to the access log
Changed
  • improved ipc logging code
  • improved MSG_2101 logging
Fixed
  • fixed more issues with ipc tracing
  • fixed SBIE2101 issue with crome and derivatives

Hotfix (5.46.1) ChangelogAdded
  • added "RunServiceAsSystem=..." allows specific named services to be ran as system
Changed
  • refactored some code around SCM access
Fixed
  • fixed a crash issue in SbieSvc.exe introduced with the last build
  • fixed issue with sandman ui update check
Removed
  • removed "ProtectRpcSs=y" due to incompatybility with new isolation defaults
Download
[-] The following 1 user Likes harlan4096's post:
  • silversurfer
Reply
#18
Information 
Quote:Sandboxie v0.5.4 / 5.46.2 - Test Build:

Changed
  • improved access tracing, removed redundant entries
  • OpenIpcPath=\BaseNamedObjects[CoreUI]-* is now hardcoded in the driver no need for the template entry
  • WindowsFontCache is now open by default
  • refactored some IPC code in the driver
Fixed
  • fixed creation time not always being properly updated in the SandMan UI
Download
[-] The following 1 user Likes harlan4096's post:
  • silversurfer
Reply
#19
Information 
Quote:Changelog

Added
  • added "SandboxService=..." to force selected services to be started in the sandbox
  • added template cleanup functionality to plus UI
  • allow internet prompt now also allow internet access pemanently
  • added browse button for box root folder in the SandMan UI
  • added explorer info message
  • added option to keep the sandman UI always on top
  • added drag and drop file on to sandman exe to open/run it sandboxed
  • added start SandMan UI when a sandboxed application starts
  • recovery window can now list all files
  • added file cunter to recovery window
  • when "NoAddProcessToJob=y" is specified chrome and alike now can fully use the job system
    -- Note: "NoAddProcessToJob=y" reduces the box isolation, but the affected functions are mostly covered by UIPI anyways
  • added obtimized default column widths to the sbie view
Changed
  • improved access tracing, removed redundant entries
  • OpenIpcPath=\BaseNamedObjects[CoreUI]-* is now hardcoded in the driver no need for the template entry
  • WindowsFontCache is now open by default
  • refactored some IPC code in the driver
  • updated templates (thanks isaak654)
  • when trying to take a snapshot of an empty sandbox a proper error message is displayed
  • new layout for the recovery window
  • sbie view sorting is now case insensitive
Fixed
  • fixed issue allowing to bypass the registry isolation, present since Windows 10 Creators Update
  • fixed creation time not always being properly updated in the SandMan UI
  • fixed issue child window closing terminating application when main was hidden
  • fixed issues with non modal windows
  • fixed issues connecting in portable mode to driver
  • fixed minor issues with snapshot window
  • fixed missing error message when atempting to create an aleady existing sandbox
  • fixed issue allowing to save setting when a sandbox was alrady deleted
  • fixed issues with disabled items in dark mode
  • fixed some dialogs not closing on esc
  • fixed tab stops on many windows
Download
[-] The following 1 user Likes harlan4096's post:
  • silversurfer
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username:


Password:





[-]
Recent Posts
Skype 8.31.0.92
Skype 8.68.0.96 ...Mohammad.Poorya — 02:46
AnyDesk 5.3.2
AnyDesk 6.1.4 Chang...Mohammad.Poorya — 02:40
Funny pictures
Imran — 15:48
Google Searches Expose Stolen Corporate ...
Attackers behind a...silversurfer — 15:46
Google Forms Set Baseline For Widespread...
A threat actor has...silversurfer — 15:42

[-]
Birthdays
Today's Birthdays
avatar (46)Josepharelf
avatar (35)kholukrefar
Upcoming Birthdays
avatar (45)theoldevext
avatar (40)algratCep
avatar (35)zetssToomy
avatar (42)GornOr
avatar (45)Jamesmog
avatar (33)opeqyrav
avatar (36)uxegihor

[-]
Online Staff
dhruv2193's profile dhruv2193

>