Secure destruction of sensitive virtual data, temporary files and swap partitions
-
Updated
Jan 16, 2023 - Python
Secure destruction of sensitive virtual data, temporary files and swap partitions
The Raspberry Pi storage scrub station for USB thumb drives.
ChronoCrypt is a powerful CLI-based encryption tool that allows users to create time-locked secure notes that self-destruct after a specified duration. It uses AES-256 encryption (CBC mode) to securely store sensitive information, ensuring that notes are unreadable beyond their expiry time.
Petoron Time Burn Cipher (PTBC) - irreversible encryption with time self-destruction and non-recoverability
Secure Encryption and Deletion Application
A a collection of secure delete algorithms in a CLI that can be used to overwrite data in a way that makes it difficult or impossible to recover. The algorithms included in this collection are zero-fill, DoD 5220.22-M, and random data.
Petoron Local Destroyer (PLD) irreversible cryptographic file wiper based on entropy rewriting. No logs. No trace. No recovery.
A Python-based tool for securely deleting files and folders with overwrite functionality. Created by MD. Bayazid.
Simple python script to safely delete sensitive files
Compact Security Suite is a lean desktop application designed for essential security workflows. It integrates hashing, AES-256-GCM encryption/decryption, secure file deletion, and ZIP archive management, all within a bilingual (EN/DE) GUI built with Tkinter.
🔥 A futuristic, GUI-based file and folder shredder for Linux – HDD & SSD aware, recursive, TRIM-enabled, and themed after Skynet. Built with Python + PyQt5. Secure delete made nerdy.
🔒 Professional secure device wiping tool - permanent data destruction with intelligent algorithms and resume support
A military-grade file shredding tool that overwrites data multiple times using advanced algorithms, making recovery impossible even with forensic tools.
ARYWIPE is a secure file deletion tool for educational and pentesting purposes. It permanently erases files to prevent recovery in a controlled environment. This tool should be used only on systems and data you own or are authorized to test, never on unauthorized devices.
Add a description, image, and links to the secure-delete topic page so that developers can more easily learn about it.
To associate your repository with the secure-delete topic, visit your repo's landing page and select "manage topics."