Download
Binary installer (Windows x64)
The canonical distribution point is GitHub Releases. Download both the
.exe and the .exe.sha256 sidecar; verify
before running.
Current build
| Version | 0.1.0-alpha.local14 |
|---|---|
| Upstream | VirtualBox 7.2.7 OSE base |
| Platform | Windows 10 22H2+, Windows 11 (x64 only) |
| Size | ~ 94 MB installer, ~ 210 MB installed |
| Checksum | .sha256 sidecar on Releases page |
| Signature | Self-signed kernel driver CA (project-owned). EV-cert path optional in 0.5.0. |
| License | GPL v3 (VBox-derivative) · Apache-2.0 (standalone toolkit) |
Verify before installing
# PowerShell
(Get-FileHash .\OpenHuizeBox-Setup-*.exe -Algorithm SHA256).Hash
# compare against the contents of the .sha256 sidecar file
Build from source
Reproducible from a clean git clone --recursive on a
reference host in about 45 minutes. See
QUICKSTART.md
for the full sequence.
git clone --recursive https://github.com/zhihuiyuze/OpenHuizeBox.git
cd OpenHuizeBox
powershell -File .\build\install_build_toolchain.ps1
powershell -File .\build\local_build.ps1
Kernel driver
VBoxSup must load for VMs to power on. The installer
generates a self-signed CA, signs the driver and all ring-0 modules
(VMMR0.r0, VBoxDDR0.r0) with it, installs
the CA into LocalMachine trust, and enables Windows test-signing.
Reboot once; run build\post_reboot_driver_check.ps1 to
confirm.
If you don't want test-signing on, you have three options:
- Use OpenHuizeBox against an already-installed upstream Oracle VirtualBox driver (you lose OpenHuizeBox-specific kernel extensions but keep the GUI + profile library).
- Wait for the EV-cert / Microsoft-attested build
(planned
0.5.0, undated). - Don't install. The hardware-identity profile library and audit scripts work as host-side tooling against your own VirtualBox.
Uninstall
Control Panel → OpenHuizeBox → Uninstall performs
a full removal: kernel driver, project CA from LocalMachine stores,
scheduled tasks. VM disk images, captured .pcapng files
and applied profiles under your user profile are not
touched — delete manually if needed.
Integrity and reproducibility
Every release is produced from a pinned upstream SHA (recorded in
UPSTREAM_TRACKING.md)
plus the patch set / fork branch frozen at a specific commit. A
reproducibility gap is a release blocker.