A Windows Sandbox (WSB) testing tool for easily testing applications, scripts, and installers in an isolated environment.
Test software safely before installing on your main system with automatic WinGet installation, customizable test scenarios, and an easy-to-use interface.
- Auto-Installation - Prompts to enable Windows Sandbox if not available
- Easy-to-Use Interface - Configure sandbox parameters with high-DPI responsive UI
- Smart Script Mapping - Automatically selects appropriate scripts based on file patterns
- Package Lists - Install predefined sets of applications via WinGet
- Dark Mode Support - UI adapts to Windows theme automatically
- Explorer Integration - Right-click files/folders to test directly in sandbox (optional)
- Network-Only Mode - Enable internet access without WinGet installation (~20-30s faster)
- Desktop Shortcuts - Useful tools (CMTrace, Sysinternals, NirSoft, etc.) pre-configured
- Windows 10/11 Pro, Enterprise, or Education
- Windows Sandbox feature (auto-prompt to install if missing)
- Download the latest release: SandboxStart-v#.#.#.#.zip
- Unblock and extract the ZIP file
- Right-click
SandboxStart.ps1and select "Run with PowerShell"
See Getting Started for detailed installation instructions.
For detailed information, please visit the Wiki:
- Getting Started - Installation and first steps
- User Guide - Features and examples
- Troubleshooting - Common issues and solutions
- FAQ - Frequently asked questions
- Test downloaded software before installing on main system
- Try out new applications in a safe environment
- Test software from untrusted sources safely
- Test installers without polluting your system
- Test different WinGet package versions
- Debug installation issues in clean environment
- Test deployment scripts in clean environment
- Validate MSI/EXE installers before rollout
- Find out what prerequisites are needed by an installer
- Test WinGet manifests
- Validate package updates
- Create custom package lists for testing dependency chains
- Analyze suspicious executables in isolated environment
- Test malware behavior relatively safe (sandbox isolation)
- Conduct safe security research and testing
Nota bene: Microsoft's SandboxTest requires a R/W mapping to
%LOCALAPPDATA%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\SandboxTest\for writing the script based execution inside WSB.
- Browse to folder containing
Setup.exe - Click OK
- Sandbox launches and runs the installer
- Browse to folder containing
*.installer.yaml - Click OK
- Sandbox validates/installs the package from manifest
- Select a package list (e.g., "Python")
- Click OK
- Sandbox installs all packages in the list
See the User Guide for more examples
- See the User Guide for features and configuration
- Check Troubleshooting for common issues
- Read the FAQ for quick answers
SandboxStart/
├── SandboxStart.ps1 # Main launcher
├── startmenu-icon.ico # Icon for shortcut
├── Test-WindowsSandbox.ps1 # WSB detection/installation
├── Update-StartMenuShortcut.ps1 # Manages shortcut creation/updating
├── shared/ # Submodule (SandboxTest-Shared)
│ ├── SandboxTest.ps1 # Core sandbox function
│ ├── Shared-Helpers.ps1 # Core helpers
│ └── Show-SandboxTestDialog.ps1 # GUI dialog
└── wsb/ # Created at first run
├── script-mappings.txt # Pattern→Script mappings
├── config.ini # Package lists/extensions configuration
├── AutoInstall.txt # Special auto-install list
├── Std-*.ps1 # Default scripts (auto-downloaded)
├── Std-*.txt # Default package lists (auto-downloaded)
└── [custom files] # Your own scripts and lists
Contributions are (maybe) welcome! See CLAUDE.md for developer information.
- Windows Sandbox Overview
- WinGet Documentation
- WAU-Settings-GUI (parent project)
- SandboxTest-Shared (submodule repository)
- Based on Microsoft's SandboxTest
- Provides tools: CMTrace, IntuneWinAppUtilDecoder, CTT Windows Utility, AdvancedRun, UninstallView
If you find this tool useful, please consider giving it a star on GitHub!
Made for the Windows development community

