Home

Awesome

Version 1.0 Python 3.2+ GPL-3.0 License

wiper

Toolkit to perform secure destruction of sensitive virtual data, temporary files and swap memories.

It has been designed to make tasks about personal data destruction easier, for example those which remain on work computers when employees leave the company. Making the entire process easier through the interactive mode and allowing it to be automated through the CLI mode, it can be useful for both the employee and the companies when cleaning personal data on PCs that is going to be reused.

You can configure your own overwrite method, choosing and combining between ones, zeros and/or random data methods as many times as you want (e.g.: or, rzzrozr, roozr...). By default, it performs a single one-pass with random data.

Usage

usage: wiper.py [-h] [-i] [-f path] [-p path] [-r path] [-t] [-u] [-T] [-U] [-s]

optional arguments:
  -h, --help            show this help message and exit
  -i, --interactive     interactive mode, the script will guide you
  -f path, --free path  wipe all free space on given path
  -p path, --path path  path to dir/file you want to wipe
  -m ozr, --method ozr  overwrite methods to apply (o: ones, z: zeros, r: random),
                        you can combine it and choose the order
  -r path, --root path  set a custom root path if you want to wipe with auto-search modes
                        an unbooted system (e.g. /media/drive)
  -u, --home            auto-search mode: locate actual user home directory and wipes it
  -U, --home-all        auto-search mode: locate all users home directory and wipes it
  -s, --swaps           auto-search mode: locate swap partitions/pagefiles and wipes it
                        (be careful: UUID swap partitions also will be wiped)

Interactive example

<p align="center"><img src="https://github.com/R3nt0n/wiper/blob/master/img/wiper-1.0-interactive.gif" /></p>

CLI example

<p align="center"><img src="https://github.com/R3nt0n/wiper/blob/master/img/wiper-1.0-cli.gif" /></p>

Advanced examples

Features

How it works

Requirements

Changelist

1.0 version notes (05/07/2020)
0.9~beta version notes (29/06/2020)
0.6~beta version notes (20/06/2020)
0.5~beta version notes (20/06/2020)

TODO list

Legal disclaimer

This tool is created for the sole purpose of security awareness and education, it should not be used against systems that you do not have permission to test/attack. The author is not responsible for misuse or for any damage that you may cause. You agree that you use this software at your own risk.