• Stars
    star
    248
  • Rank 163,560 (Top 4 %)
  • Language
    C++
  • License
    Boost Software Li...
  • Created over 2 years ago
  • Updated about 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Bootkit for Windows Sandbox to disable DSE/PatchGuard.

SandboxBootkit

Bootkit tested on Windows Sandbox to patch ntoskrnl.exe and disable DSE/PatchGuard. There is a blog post going into more detail about the implementation.

Getting started

  • Download the latest release and extract the archive
  • Run Installer.exe
  • Start Windows Sandbox

Note: (parts of) the release might be detected as a virus by Windows Defender. This is a false positive, so you might need to add an exclusion.

Troubleshooting

If you run into issues getting things to work on Windows Sandbox make sure you try with development mode enabled (CmDiag DevelopmentMode -On). On Windows 11 there have been reports of the changes not being applied to the sandbox without it.

Standalone bootkit

You can run SandbotBootkit.efi on real hardware or a VM too (although you might as well use EfiGuard in that case). To do so you attach a new (virtual) disk (formatted as FAT32) and copy SandboxBootkit.efi to \EFI\Boot\bootx64.efi. Then change the boot order to boot from your new disk first. The relevant functionality is implemented in the LoadBootManager function.

Development

  • Clone the project (with submodules)
  • Use SandboxBootkit.sln to build the project
  • Look at the Installer project on how to install the bootkit

Note: During development it's easiest to enable development mode. Without it you won't be able to write to the BaseLayer.