Skip to content

Rapidly initialize Windows Sanbox for malware analysis and reverse engineering

License

Notifications You must be signed in to change notification settings

jm33-m0/windows-sandbox-init

Repository files navigation

Windows Sandbox Init Script

What it does

This project aims to automatically configure a Windows Sanbox for malware analysis with offline software packages in current working directory.

How to use

Make sure you have Windows Sandbox enabled.

  1. Run download_pkgs.ps1 to download all packages for offline use, and update the checksums for later verification.
  2. Start 0-malware-analysis.wsb.
  3. Generally it should be done within a minute.

Screenshots

screenshot