A powerful, modern GUI manager for Windows Sandbox. Enable or disable the sandbox feature with a single click and integrate "Open in Sandbox (Read-Only)" directly into your right-click context menu for safe testing.
Testing suspicious files shouldn't be complicated.
Windows Sandbox is a fantastic feature, but mounting folders usually requires manually creating .wsb configuration files. Windows Sandbox Reloaded solves this by automating the process via the Context Menu.
- 🚀 One-Click Toggle: Enable or Disable the "Windows Sandbox" optional feature without digging through the Control Panel.
- 🖱️ Context Menu Integration: Adds a right-click option to your File Explorer background.
- Action: Instantly mounts the current folder into a fresh Sandbox instance.
- Mode: Read-Only. The sandbox cannot modify, encrypt, or delete your original files. Perfect for malware analysis.
- 🎨 Modern UI & Theme Engine: Automatically detects your Windows System Theme (Dark/Light Mode) and adjusts the interface in real-time.
- 🔒 Safe Execution: The tool uses native PowerShell and Windows API calls. No external binaries or DLLs are required.
- OS: Windows 10 Pro/Enterprise or Windows 11 Pro/Enterprise.
- Virtualization: Must be enabled in BIOS.
- Download the latest
Windows_Sandbox_Reloaded.exefrom the Releases Page. - Double-click
Windows_Sandbox_Reloaded.exeto run.
- Download the source code.
- Right-click
Windows_Sandbox_Reloaded.ps1and select Run with PowerShell.- Note: If you encounter an Execution Policy error, run this command in PowerShell once:
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass
- Note: Requires Administrator privileges to enable features and modify the Registry.
- Note: If you encounter an Execution Policy error, run this command in PowerShell once:
- Use the switches to enable the Sandbox Feature or the Context Menu integration.
You may notice that some antivirus engines (such as Windows Defender, SentinelOne, or CrowdStrike) flag the .exe release of this tool as suspicious (e.g., Trojan:Win32/Wacatac, MachineLearning/Anomalous, or Generic.Malware).
This is a known False Positive.
This application is originally a PowerShell script converted into an executable (.exe) to make it easier to run. Modern antivirus "AI" and "Heuristic" engines often aggressively block any unsigned program that executes PowerShell commands internally, classifying them as "droppers" or "loaders" by default, even if the code itself is completely safe.
Since this project is open-source, you do not have to use the EXE file.
If your antivirus blocks the executable or if you prefer full transparency, you can run the source script directly:
-
Download the
.ps1file from this repository. -
Right-click the file and select Run with PowerShell.
-
(Note: You may need to enable script execution by running
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUserin PowerShell once).
We provide the compiled .exe solely for convenience (icon support, double-click execution). The code logic is identical to the .ps1 script.
When you click "Open in Sandbox (Read-Only)":
- The tool generates a temporary
.wsb(Windows Sandbox Configuration) file. - It maps the host folder to the Sandbox desktop.
- It sets
ReadOnly="true"to protect your host data. - It launches Windows Sandbox with this configuration.
While this tool mounts folders in Read-Only mode to protect your files from modification (e.g., Ransomware encryption), network access is enabled by default in Windows Sandbox.
- Always exercise caution when running unknown software.
This project is licensed under the MIT License.
Created by @osmanonurkoc

