http://www.open-source-security-software.net/project/sandbox-attacksurface-analysis-tools/releases.atomRecent releases for sandbox-attacksurface-analysis-tools2025-04-26T05:31:20.036833+00:00python-feedgensandbox-attacksurface-analysis-tools v1.0.3sandbox-attacksurface-analysis-tools v1.0.32017-03-24T20:18:28+00:002017-03-24T20:18:28+00:00sandbox-attacksurface-analysis-tools v1.0.4sandbox-attacksurface-analysis-tools v1.0.42017-05-18T13:07:57+00:002017-05-18T13:07:57+00:00sandbox-attacksurface-analysis-tools v1.0.5sandbox-attacksurface-analysis-tools v1.0.52017-05-24T13:39:49+00:001.0.5
-----
* Added additional Known SIDs
* Unified the variant Get-NtToken* cmdlets into one.
* Added additional token cmdlets such as Logon and Clipboard.
* Added initial support for IO Completion Ports
* Added object creation time property
* Added support to set a process device map
* Added top level CanSynchronize property to NtObject
* Bugs fixes from Rustam Agametov
* Made process list in token viewer a list rather than a tree and made a separate handle tab.2017-05-24T13:39:49+00:00sandbox-attacksurface-analysis-tools v1.0.6sandbox-attacksurface-analysis-tools v1.0.62017-06-06T20:04:20+00:002017-06-06T20:04:20+00:00sandbox-attacksurface-analysis-tools v1.0.7sandbox-attacksurface-analysis-tools v1.0.72017-06-14T22:14:18+00:001.0.7
-----
* Added new cmdlets to do access checking. Many of the old standalone utilities are now deprecated.
* Added cmdlets to create lowbox tokens
* Added list of known capability SIDs and resolve them during name lookup
* Added cmdlet to get a SID
* Added cmdlet to do a standalone access checking
* Reworked the APIs to include non-throwing versions of many of the core Open/Create methods.
* Made NtType more inspectable, includes access enumeration and rationalizes the opening methods.
* Various additional properties such as extended process flags, checking for LPAC
* Rework of access mask handling. Now all low-level APIs use an AccessMask structure which has
conversion operators to and from other enumerations.
* Various other bug fixes. 2017-06-14T22:14:18+00:00sandbox-attacksurface-analysis-tools v1.0.9sandbox-attacksurface-analysis-tools v1.0.92017-08-19T13:38:50+00:00Release Notes:
1.0.9
-----
* Made New-Win32Process more generic and added support for Win32k filter enable.
* Added function to capture token from a process using impersonation.
* Added basic support for Desktop and WindowStation objects using Win32u.dll exports.
* Added file locking implementation including async.
* Added hardlink enumeration.
* Added NTFS stream enumeration.
* Deprecated most of the old standalone utilities in favour of PS cmdlets.
1.0.8
-----
* Added cmdlets to create a kernel memory dump, system environment and licensing.
* Additional system calls implemented.
* Added access to secure boot policies and code integrity policies.
* Made Win32 Process creation more generic and added cmdlet.
* Added access check by type including SELF SID.2017-08-19T13:38:50+00:00sandbox-attacksurface-analysis-tools v1.1.0sandbox-attacksurface-analysis-tools v1.1.02017-08-30T11:05:15+00:001.1.0
-----
* Removed check tools, excluding CheckNetworkAccess.
* Added basic Job object cmdlets.
* Added creation of protected processes in Win32Process.
* Added service access checking cmdlet.
* Added get executable manifest cmdlet.2017-08-30T11:05:15+00:00sandbox-attacksurface-analysis-tools v1.1.1sandbox-attacksurface-analysis-tools v1.1.12017-08-30T12:46:30+00:001.1.1
-----
* Fix to native protected process creation.
* Added functions to create native NT processes.2017-08-30T12:46:30+00:00sandbox-attacksurface-analysis-tools v1.1.3sandbox-attacksurface-analysis-tools v1.1.32017-11-05T22:59:10+00:002017-11-05T22:59:10+00:00sandbox-attacksurface-analysis-tools v1.1.4sandbox-attacksurface-analysis-tools v1.1.42017-11-14T16:21:14+00:002017-11-14T16:21:14+00:00sandbox-attacksurface-analysis-tools v1.1.5sandbox-attacksurface-analysis-tools v1.1.52017-11-24T09:50:56+00:002017-11-24T09:50:56+00:00sandbox-attacksurface-analysis-tools v1.1.6sandbox-attacksurface-analysis-tools v1.1.62017-12-03T22:06:30+00:002017-12-03T22:06:30+00:00sandbox-attacksurface-analysis-tools v1.1.7sandbox-attacksurface-analysis-tools v1.1.72018-01-11T14:26:01+00:002018-01-11T14:26:01+00:00sandbox-attacksurface-analysis-tools v1.1.8sandbox-attacksurface-analysis-tools v1.1.82018-02-06T18:05:55+00:002018-02-06T18:05:55+00:00sandbox-attacksurface-analysis-tools v1.1.9sandbox-attacksurface-analysis-tools v1.1.92018-02-22T12:36:47+00:002018-02-22T12:36:47+00:00sandbox-attacksurface-analysis-tools v1.1.10sandbox-attacksurface-analysis-tools v1.1.102018-03-01T12:09:01+00:001.1.10
------
* Added support for extended handle information to allow for PIDs > 64k.
* Added basic New-NtToken cmdlet and system call.
* Added Resolve-NtObjectAdddress cmdlet to resolve the addresses of a list of objects.
* Added generic object ReOpen method.
* Added vistor method to object directories to enumerate recursively with a callback.
* Added display of process trust labels.2018-03-01T12:09:01+00:00sandbox-attacksurface-analysis-tools v1.1.11sandbox-attacksurface-analysis-tools v1.1.112018-03-04T19:42:24+00:002018-03-04T19:42:24+00:00sandbox-attacksurface-analysis-tools v1.1.12sandbox-attacksurface-analysis-tools v1.1.122018-03-19T01:43:32+00:002018-03-19T01:43:32+00:00sandbox-attacksurface-analysis-tools v1.1.13sandbox-attacksurface-analysis-tools v1.1.132018-04-04T12:18:58+00:002018-04-04T12:18:58+00:00sandbox-attacksurface-analysis-tools v1.1.14sandbox-attacksurface-analysis-tools v1.1.142018-05-01T22:06:56+00:002018-05-01T22:06:56+00:00sandbox-attacksurface-analysis-tools v1.1.15sandbox-attacksurface-analysis-tools v1.1.152018-06-19T09:41:13+00:002018-06-19T09:41:13+00:00sandbox-attacksurface-analysis-tools v1.1.16sandbox-attacksurface-analysis-tools v1.1.162018-08-01T19:47:41+00:002018-08-01T19:47:41+00:00sandbox-attacksurface-analysis-tools v1.1.17sandbox-attacksurface-analysis-tools v1.1.172018-09-09T17:28:17+00:002018-09-09T17:28:17+00:00sandbox-attacksurface-analysis-tools v1.1.18sandbox-attacksurface-analysis-tools v1.1.182019-02-04T10:59:39+00:002019-02-04T10:59:39+00:00sandbox-attacksurface-analysis-tools v1.1.19sandbox-attacksurface-analysis-tools v1.1.192019-02-04T23:09:09+00:00Bug fix release. Don't use v1.1.18.2019-02-04T23:09:09+00:00sandbox-attacksurface-analysis-tools v1.1.20sandbox-attacksurface-analysis-tools v1.1.202019-03-09T23:58:17+00:00* Added basic ALPC support including cmdlets.
* Added better debug support including cmdlets.
* Display container access rights in SD GUI and also extract SACL if available.
* Added Set/Get-NtProcessMitigation policy to get specific policies.
* Exposed process mitigation policies using flag enums.
* Added Win32.AppContainerProfile to create and delete AC profiles.
* Many new non-throwing methods added to objects.
* Added ReadScatter and WriteGather methods to NtFile.
* Improved formatting of IO Control Codes.
* Added ability to acknowledge oplock breaks.
* Added Wow64 FS redirection support.
* Use proper WIN32 NT status facility for Win32 errors as status codes.
* Added read/write to file from safe buffers.
* Added methods to zero or fill safe buffers using native methods.
* Fix bug with querying BnoIsolationPrefix which next took into account the enable flag correctly.
* Fix from diversenok "Improve detection of restricted tokens (#20)"
* Code cleanups and source code separation.2019-03-09T23:58:17+00:00sandbox-attacksurface-analysis-tools v1.1.21sandbox-attacksurface-analysis-tools v1.1.212019-04-23T22:11:28+00:001.1.21
--------
* Various updates to the NDR parser, including new types and support for correlation expressions.
* Added complete transaction cmdlets.
* Added extended process creation flags for Win32Process.
* Added Format-NtSecurityDescriptor to display on the console
* Added Copy-NtObject cmdlet.
* Added basic RPC ALPC client support.
* Added option to specify a debug object for a Win32 process.
* Added processor system information.2019-04-23T22:11:28+00:00sandbox-attacksurface-analysis-tools v1.1.22sandbox-attacksurface-analysis-tools v1.1.222019-04-30T22:17:22+00:001.1.22
--------
* Removed old standalone utilities, everything should be accessible from PowerShell.
* Added Test-NetworkAccess cmdlet to replace CheckNetworkAccess utility.
* Added Set-NtFileHardlink cmdlet.
* Various fixes for RPC client code.2019-04-30T22:17:22+00:00sandbox-attacksurface-analysis-tools v1.1.23sandbox-attacksurface-analysis-tools v1.1.232019-10-18T14:14:49+00:001.1.23
--------
* Added basic ETW APIs.
* Added new thread properties.
* Added Close-NtObject function.
* Added Get-AccessibleScheduledTask cmdlet.
* Added typing for New-ExecutionAlias and renamed to Set-ExecutionAlias.
* Added Compare-RpcServer.
* Fixed handling of FQBN token security attributes.
* Added option to Format-RpcClient to output to a directory.
* Added Select-RpcServer cmdlet.
* Added RPC ALPC port brute force.2019-10-18T14:14:49+00:00sandbox-attacksurface-analysis-tools v1.1.24sandbox-attacksurface-analysis-tools v1.1.242019-12-10T03:23:25+00:001.1.24
--------
* Added Add-NtTokenSecurityAttribute and Remove-NtTokenSecurityAttribute cmdlets.
* Added additional properties for running servies.
* Added support for drivers to Get-RunningService and Get-AccesibleService.
* Added fake service NtType objects for services and SCM to allow formatting and the UI.
* Added NtType property to security descriptors.
* Added option to Show-NtToken to elevate to admin.
* Added Suspend, Resume and Stop process commands.
* Added Get-NtEaBuffer and Set-NtEaBuffer commands.
* Added open to Get-NtDebug to get from a process.2019-12-10T03:23:25+00:00sandbox-attacksurface-analysis-tools v1.1.25sandbox-attacksurface-analysis-tools v1.1.252020-01-02T01:59:01+00:001.1.25
--------
* Added new options to Get-NtSecurityDescriptor.
* Updated accessible resource checking.
* Added Remove-NtTokenPrivilege.
* Added Session option to Get-NtToken.
* Added command line option to Show-NtToken.
* Added information classes for symbolic links.2020-01-02T01:59:01+00:00sandbox-attacksurface-analysis-tools v1.1.26sandbox-attacksurface-analysis-tools v1.1.262020-01-21T22:02:44+00:001.1.26
--------
* Add DeviceGuid to Get/New-NtFile
* Fixed bug in ETA registrations and added GUID enumeration.
* Added SetExceptionPort to NtProcess.
* Added child process mitigation improvements.
* Added extended Fork.
* Updated native process creation support.
* Various new non-throwing methods.
* Updated to C# 7.3.
* Added list of access rights to NtType.
* Added default mandatory policy to NtType.
* Added SetDisposition methods to NtFile.
* Added console and GUI support for Object ACEs.
* Updated access checking to support Object Types.
* Access check returns a structure rather than just an access mask.
* CPP style NDR formatting (#21)
* Added Get-NtTokenPrivilege command.
* Added Get-NtLocallyUniqueId command.2020-01-21T22:02:44+00:00sandbox-attacksurface-analysis-tools v1.1.27sandbox-attacksurface-analysis-tools v1.1.272020-02-10T06:17:39+00:001.1.27
--------
* Added support for directory change notifications.
* Added New-NtDesktop, Get-NtDesktop and Get-NtDesktopName.
* Added New-NtWindowStation, Get-NtWindowStation and Get-NtWindowStationName.
* Changed Win32 error codes to an enumeration.
* Added Load/Unload driver.
* Added properties to NtType to show access masks.
* Added basic SendInput method.
* Added token source tab to Token Viewer.
* Updated for the Job object and New-NtJob.
* Added NtWindow class a HWND enumeration.
* Added Get-AccessibleWindowStation command.
* Added some well known WNF names.
* Added option to Get-AccessibleService to check file permissions.
* Added Set-NtProcessJob command.
* Added Get-AccessibleToken command.
* Added support for compound ACEs.
* Added Get/Sid-NtTokenSid and Get/Set-NtTokenGroup.
* Added Get-AccessibleEventTrace command.
* Added Get-AccessibleWnf command.2020-02-10T06:17:39+00:00sandbox-attacksurface-analysis-tools v1.1.28sandbox-attacksurface-analysis-tools v1.1.282020-06-30T21:08:46+00:001.1.28
--------
* Added Import-Win32Module and Get-Win32Module.
* Added support for Registry Keys in the NtObjectManager provider.
* Added Get-NtDirectoryEntry.
* Added Win32 CreateRemoteThread.
* Added addition Registry Key functions.
* Added Network Authentication commands.
* Added Authentication Token formatting commands.
* Added new filtering features to TokenViewer.
* Improved cmdlets for getting and setting object information classes.
* Added Add-NtSection and Remove-NtSection.
* Added Compare-NtObject.
* Added Test-NtTokenPrivilege.
* Added type parsing from PDBs via SymbolResolver.
* Added a summary format to Format-NtSecurityDescriptor.
* Added Out-HexDump.
* Added C# compiler support for .NET Core Support of Get-RpcClient.
* Updated New-NtSecurityDescriptor and Edit-NtSecurityDescriptor.
* Basic C++ NDR formatting from irsl@.
* Added Format-NtJob.
* Added New-NtSecurityAttribute and Get-NtAceConditionData.
* Added Device/User Claims to Token Viewer and Format-NtToken.
* Added many different commands to manipulate Security Descriptors.
* Added Win32 Security Descriptor commands.
* Added filtering for accessible path commands.
* Added Audit support.
* Added basic AuthZ API support.
* Added basic ASN.1 DER parsing and Format-ASN1DER command.
* Added Kerberos Keytab file reading and writing.2020-06-30T21:08:46+00:00sandbox-attacksurface-analysis-tools v1.1.29sandbox-attacksurface-analysis-tools v1.1.292020-11-23T06:09:41+00:001.1.29
--------
* Added Get-NtProcessUser.
* Added Get-NtProcessEnvironment.
* Added global option for New-NtSymbolicLink.
* Added Split-Win32CommandLine.
* Added send and post methods to NtMessage.
* Added AsObject parameter for Get-NtObjectInformation.
* Added NtMailslotFile and fixed mailslot creation.
* Added Get-NtKeySymbolicLinkTarget.
* Added support for a FollowLink switch which will allow accessible cmdlets to follow symbolic links. Feature request #29.
* Separated forms code from the main assembly.
* Added setting service security and Get/Set-Win32ServiceSecurityDescriptor.
* Added Win32 debug console class and Start/New/Read-Win32DebugConsole.
* Added Test-NtTokenCapability.
* Added New-Win32Service and Remove-Win32Service.
* Reimplemented SidName to allow access to the Domain component.
* Added section characteristics check when parsing RPC servers. Fix for issue #27.
* Added an SDKName attribute to access rights.
* Added Add-NtAccountRight and Remove-NtAccountRight.
* Added basic VBS enclave support.
* Added support to parse ELAM information from a binary.
* Added Get-NtSigningLevel and Get-X509Certificate.
* Added Compare-NtSigningLevel.
* Added silo impersonation commands.
* Added option to impersonation System when creating a token or with Invoke-NtToken.
* Added proper enumeration of AppContainer profiles and support creating with capabilities.
* Added Get-AppModelApplicationPolicy.
* Added Get-NtThreadContext and Set-NtThreadContext.
* Added support for calling CreateProcessWithLogon via Win32Process.
* Added Start-AppModelApplication.
* Added Add-NtThreadApc.
* Fixed path handling in Get-Win32SecurityDescriptor.
* Added Get-NtFileFinalPath command.
* Reworked handling of lease oplocks.
* Added basic USN journal support.
* Added Get-NtFileStream.
* Added Get-NtMountPoint command.
* Added basic async support and the Wait-AsyncTaskResult command.
* Added Send-NtFileControl command.
* Added Get-NtFileVolumeInformation and Set-NtFileVolumeInformation.
* Added Get-NtFileItem command.
* Added support for querying device nodes, setup class and interface classes.
* Added Get-NtFileSharingProcess.
* IPeb: Added GetBeingDebugged() (#26)
* Added support for enumerating filter drivers and connecting to ports.
* Added New-NtKeySymbolicLink and Set-NtKeySymbolicLinkTarget.
* Added a Get-NtKeyHive command.2020-11-23T06:09:41+00:00sandbox-attacksurface-analysis-tools v1.1.30sandbox-attacksurface-analysis-tools v1.1.302021-01-15T16:19:49+00:001.1.30
--------
* Fixed issue when displaying only a SACL with Format-NtSecurityDescriptor.
* Added basic named pipe support for RPC clients.
* Fixed issue enumerating per-user audit rules.
* Added view accessor for safe buffers.
* Improved debug tracing for RPC clients.
* Improved handling of paths with local files commands.
* Fixed path issue with Set-Win32SecurityDescriptor.
* Added querying trace providers from the WMI security key.2021-01-15T16:19:49+00:00sandbox-attacksurface-analysis-tools v1.1.31sandbox-attacksurface-analysis-tools v1.1.312021-03-16T05:26:01+00:001.1.31
--------
* Added signing and encryption to SSPI.
* Added Get-LsaContextSignature and Test-LsaContextSignature.
* Added Protect-LsaContextMessage and Unprotect-LsaContextMessage
* Named auth commands to Lsa.
* Added TCP/IP RPC transport and add signing/encryption.
* Added Disconnect-RpcClient.
* Added server information for local RPC connection.
* Added Enable-NtTokenPrivilege and Disable-NtTokenPrivilege.
* Added native ARM/ARM64 support.
* Added Get-Win32ServiceConfig and Set-Win32ServiceConfig.
* Fixed bug in ACL canonicalization.
* Added support for SDK names of enumerations/structures.
* Added Get-NtSDKName.
* Added support for Win32 WriteProcessMemory.
* Added Get-Win32ServiceTrigger and support for triggers in Start-Win32Service.
* Added Set-Win32ServiceSecurityDescriptor.
* Fixed INdrStructure unmarshaling #352021-03-16T05:26:01+00:00sandbox-attacksurface-analysis-tools v1.1.32sandbox-attacksurface-analysis-tools v1.1.322021-08-18T04:00:09+00:002021-08-18T04:00:09+00:00sandbox-attacksurface-analysis-tools v.1.1.33sandbox-attacksurface-analysis-tools v.1.1.332022-01-22T23:42:01+00:001.1.33
--------
* Various bug fixes.
* Added RPC pipe support.2022-01-22T23:42:01+00:00