Sandboxie!

* Home https://www.sandboxie.com
* Help & FAQ https://www.sandboxie.com/index.php?HelpTopics
* Forum http://forums.sandboxie.com/phpBB3/
* Download https://www.sandboxie.com/index.php?DownloadSandboxie
* Buy https://www.sandboxie.com/index.php?RegisterSandboxie
* Home Use https://www.sandboxie.com/index.php?HomeUse
* Commercial Use https://www.sandboxie.com/index.php?CommercialUse
* Search https://www.sandboxie.com/index.php?FindPage

Sandboxie alternatives

  • Cameyo

  • Cameyo is a free, open-architecture application virtualization product. It combines best-of-breed application virtualization technology with simplicity.

    tags: WINE app-isolation app-packaging application-packaging application-virtualization
  • firejail

  • Firejail is a SUID security sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf. It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table, mount table.

    tags: sandbox
  • Shadow Defender

  • Shadow Defender is an easy-to-use security solution (for Windows operating systems) that protects your PC/laptop real environment against malicious activity and unwanted changes.

    tags: pc-security privacy-protection
  • SHADE Sandbox

  • SHADE Sandbox is an alternative for antivirus and a tool for virtualization. It locally virtualizes applications (i.e. internet browsers) and locks all incoming internet files and possible viruses in its safe virtual environment - a “sandbox”, keeping them isolated from the Operating System to maintain it clean from malware.

    tags: antivirus computer-protection firewall internet-security malware-scanner
  • Cuckoo Sandbox

  • Cuckoo Sandbox is a modular, automated malware analysis system. Running from command-line on a Linux or Mac host, it uses python and virtualization (VirtualBox, QEMU-KVM, etc) to create an isolated Windows guest environment to safely and automatically run and analyze files to collect comprehensive file behavior analysis. These results outline what the malware does while running inside an isolated Windows operating system, including Win32 API calls, files created/deleted, memory dumps, network traffic trace, screenshots of execution behavior, and full memory dumps of virtual machines. »

    tags: command-line-interface monitor-changes virtual-machines sandboxing malware-analysis
  • BitBox

  • The Virtual Environment for secured and comfortable Web Browsing: On the basis of a “Browser-in-the-Box” concept a virtual machine is provided with a reduced operating system and a web browser encapsulated therein. Malware can’t thus penetrate the host operating system and a potential damage in the separated virtual machine will vanish with each start of the browser by returning to a certified starting point. All of that is fully transparent to the user.Protection against malware and data Leakage »

    tags: chromium-based firefox-based secure-connection secure-internet secure-web
  • GesWall

  • GeSWall is intrusion prevention system that is non-intrusive and easy to use. With GeSWall, you can safely surf the web, use e-mail, chat, exchange files etc, regardless of the security threats posed by the Internet. GeSWall is a required supplementary to your anti-virus, anti-spyware and personal firewall as it blocks unknown threats missed by those solutions.

    tags: sandbox data-security sandboxing
  • ReHIPS

  • Based on well documented certified safe and secure Windows built-in security subsystems.Compatible with all current Windows versions from Windows Vista SP1 to Windows 10 and doesn't require frequent updates.Supports 32-bit and 64-bit Windows versions.Has AntiSpy feature protecting you from cyber espionage.Protects from zero-day attacks, exploits and malware. Including previously unknown threats.Completely autonomous and doesn't require Internet access.Includes initial database of rules which includes more than 400 applications. The database is regulary updated.Allows to isolate any untrusted application with access control to network and system resources including file system objects and registry.Compatible with other security solutions.Includes our unique DeployHelper technology which helps to install software straight into isolated environment.Desktop is a security boundary. Only ReHIPS uses separate desktops feature. »

    tags: antispy antivirus hips privacy-protection sandbox
  • BufferZone

  • BUFFERZONE is a patented containment solution that isolates threats to defend endpoints from malware, zero-days, ransomware, drive-bys and more.

    tags: sandbox endpoint-security anti-malware isolate
  • WinJail

  • Sandboxing software for Windows OSWinJail is full implementation of chroot, with additional features like "copy-on-write" mechanism applied to chroot'ed files, additional registry based chroot, and more.

    tags: sandbox jail chroot