-
Notifications
You must be signed in to change notification settings - Fork 201
Windows Sandbox
Windows Sandbox is a lightweight, isolated environment that allows you to run untrusted applications for Windows users. When you run ART in Windows Sandbox, you can ensure that any "malicious-like" activities or artifacts generated by the tests won't affect your host system. Once you close the Sandbox, all changes are discarded.
Setting up Windows Sandbox is relatively easy, as it's a built-in feature in Windows 10 and later versions. You don't need to install additional software or configure complex settings. You can quickly launch ART in a clean environment for testing purposes.
You can check here for Windows editions that support Sandbox.
Follow the Installation Instructions to enable Windows Sandbox in your machine.
Once you enable Windows Sandbox, download and open the WSB file from your File Explorer. It should launch a clean environment for running your atomics.
Questions? Get connected to the community on the Atomic Red Team Slack channel.
- Installation
- Import the Module
- List Atomic Tests
- Check/Get Prerequisites for Atomic Tests
- Execute Atomic Tests (Local)
- Execute Atomic Tests (Remote)
- Specify Custom Input Arguments
- Cleanup after Executing Atomic Tests
- Execution Logging
- Adversary Emulation
- Continuous Atomic Testing
- Execution Hooks
- Helper Functions
- The Atomic GUI
- Uninstallation