shredos.x86_64

Disk Wiper

Tools and scripts for securely erasing and wiping hard drives

Shredos Disk Eraser 64 bit for all Intel 64 bit processors as well as processors from AMD and other vendors which make compatible 64 bit chips. ShredOS - Secure disk erasure/wipe

GitHub

2k stars
25 watching
64 forks
Language: Makefile
last commit: 2 months ago
buildrootdbandeletediskdoddwipeeraseerase-diskeraserhdparmhexeditnwipeprngprng-methodssecure-disk-eraseusbwipe

Related projects:

Repository Description Stars
drewsif/wipedicks A tool to securely wipe files and drives by writing random ASCII characters. 129
dekunukem/bob_cassette_rewinder Software to bypass DRM on Bob Dishwasher detergent cartridges and refill them at a significant cost savings 1,442
woubuc/sweep Automates removal of unnecessary files and directories to reduce disk usage in projects. 179
r3nt0n/wiper A tool designed to securely destroy sensitive data on computers by overwriting files and partitions with random or fixed patterns. 73
berke/wipe A tool for securely wiping out files from magnetic media. 48
edenwaith/permanent-eraser Utility to securely erase files on Mac OS X. 22
rafael-santiago/lethe A data wiping tool that securely destroys sensitive information by overwriting it multiple times 20
developit/rollup-plugin-preserve-shebang Automates preservation of executable shebangs in entry files for Rollup builds. 48
pfultz2/cloak A library to demonstrate the recursive capabilities of the preprocessor in C. 921
robhabraken/shrink Analyzes and cleans up media libraries in Sitecore databases to optimize storage usage. 2
hpi-swa/trufflesqueak A Squeak/Smalltalk VM and Polyglot Programming Environment for the GraalVM. 285
westonplatter/phashion A Ruby wrapper around a perceptual hash library to detect duplicate multimedia files. 704
nivekuil/rip A safer alternative to rm with features like file backup and undo functionality 1,440
determinatesystems/flake-checker Verifies Nix projects are using up-to-date and supported versions of Nixpkgs 174
hasherezade/persistence_demos Demonstrates various persistence methods used by malware 219