mirror of
https://github.com/Endermanch/MalwareDatabase.git
synced 2026-05-09 08:25:29 +02:00
[GH-ISSUE #413] Will NoEscape escape Windows Sandbox? #292
Labels
No labels
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/MalwareDatabase#292
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @txlhx on GitHub (Nov 8, 2025).
Original GitHub issue: https://github.com/Endermanch/MalwareDatabase/issues/413
Hello there!
My question is that if I run NoEscape malware on Windows Sandbox (after turning network off), will it escape or not? Or I am better using a Virual Machine on VirtualBox or VMWare? (or which one is best)
@JHarrison712 commented on GitHub (Nov 9, 2025):
I’d recommend using a full Virtual Machine rather than Windows Sandbox. Windows Sandbox offers some isolation, but it shares parts of the host OS and isn’t designed for handling active malware safely.
Both VirtualBox and VMware Workstation are fine, VMware tends to be a bit more stable and feature-rich, while VirtualBox is free and open-source. For malware testing, either will give you stronger isolation than Windows Sandbox.
@Reacherch commented on GitHub (Dec 4, 2025):
try using Virual Box Or VMWare
@Miygteet commented on GitHub (Dec 8, 2025):
in my honest opinion you should use oracle virtualbox i used it for malware testing and it works
@JHarrison712 commented on GitHub (Dec 9, 2025):
@txlhx Did these comments help if so please consider closing this issue?.