Versions:

  • 1.17.3
  • 1.17.2
  • 1.17.1
  • 1.17.0
  • 1.16.9
  • 1.16.8
  • 1.16.7
  • 1.16.6
  • 1.16.5
  • 1.16.4
  • 1.16.3
  • 1.16.2
  • 1.15.12
  • 1.15.11
  • 1.15.10
  • 1.15.9
  • 1.15.8
  • 1.15.7
  • 1.15.6
  • 1.15.5
  • 1.15.4
  • 1.15.3
  • 1.14.10
  • 1.14.9
  • 1.14.8
  • 1.14.7
  • 1.14.6
  • 1.14.5
  • 1.14.4
  • 1.14.3
  • 1.13.7
  • 1.13.4
  • 1.13.3
  • 1.12.9
  • 1.12.8
  • 1.12.7
  • 1.12.6
  • 1.12.5
  • 1.12.4
  • 1.12.3
  • 1.11.4
  • 1.11.3
  • 1.11.2
  • 1.10.5
  • 1.10.4
  • 1.9.8
  • 1.9.7
  • 1.9.6
  • 1.9.5
  • 1.9.4
  • 1.9.3
  • 1.9.2
  • 1.9.1
  • 1.8.4
  • 1.8.3
  • 1.7.2
  • 1.6.7
  • 1.6.6
  • 1.6.5
  • 1.6.4
  • 1.6.3
  • 1.6.2
  • 1.5.3
  • 1.5.2
  • 1.5.0
  • 1.4.2
  • 1.4.1
  • 1.3.5
  • 1.3.4
  • 1.3.3
  • 1.3.2
  • 1.3.1
  • 1.2.8
  • 1.2.7
  • 1.2.6
  • 1.2.3
  • 1.1.3
  • 1.0.22
  • 1.0.21
  • 1.0.20
  • 1.0.19
  • 1.0.18
  • 1.0.15
  • 1.0.13
  • 1.0.12
  • 1.0.7
  • 0.8.9
  • 0.7.5
  • 0.9.8d

Sandboxie-Plus 1.17.3 is a sandbox-based isolation utility designed for 32- and 64-bit Windows NT platforms, giving users a controlled, virtualized layer in which any application—whether a downloaded installer, a browser session, or unknown executable—runs without gaining permanent access to the real file system or registry. By intercepting and redirecting low-level operating-system calls, the program ensures that every change a monitored process attempts is confined to a disposable sandbox; once the sandbox is emptied, no residue is left on the host machine. This makes the tool equally valuable to home users who want to open suspicious e-mail attachments safely, testers who need to evaluate successive builds of beta software without littering Windows with conflicting DLLs, and administrators who must allow employees to use legacy or unsigned utilities while protecting corporate images. Because multiple sandboxes can coexist, a researcher can spin up isolated replicas of different Windows versions or browser configurations side-by-side, comparing behavioral logs without cross-contamination. The project, now curated by David Xanatos under the Sandboxie-Plus name, carries on code originally created by Ronen Tzur and later maintained by Invincea and Sophos; the transition to open source has already produced eighty-nine public releases, adding modern Qt interfaces, rule-based filtering, privacy-enhanced templates, and command-line automation suitable for CI pipelines. Frequent updates continue to refine compatibility with current Windows 10 and 11 patches, driver signing requirements, and Chromium-based browsers, ensuring that the isolation mechanism keeps pace with evolving attack vectors. Sandboxie-Plus is available for free on get.nero.com, with downloads supplied through trusted Windows package sources such as winget, always serving the newest build and enabling batch installation alongside other applications.

Tags: