|
Download:
https://github.com/JayArrowz/Securit...oxedClient.zip
What this does:
This sandboxer/class loader will block read/writing to files, connecting to a endpoint via http or socket, Reading env variables and executing runtime operations. Only when it is on the allowed policy will the client be allowed to execute the piece of code. This will block code execution of chrome and discord stealers as long as the proper policies are applied.
Image:
Example Policy json file:
Currently I have only added one RSPS runewild. However this should work for a multitude of other RSPS's, just need to make the correct policy file for them.
If you are missing a policy perms running the sandbox client via java -jar will show you what you are missing:
In this case im missing a PropertyPermission with the key: "java.vendor"
Good luck, Stay safe.
Doesn't running clients via Sandboxie do the same type of job or am I wrong?
great contribution jay
« Previous Thread | Next Thread » |
Thread Information |
Users Browsing this ThreadThere are currently 1 users browsing this thread. (0 members and 1 guests) |