Nuke My LUKS is a network-based emergency data destruction tool designed to overwrite LUKS encryption headers with random data when triggered remotely. The tool consists of four components: client.py, server.py, generateconfig.py, and nukemyluks.sh. It operates by sending UDP broadcast messages to port 1337 containing a user-defined password with an appended tag. When the correct password is received, the system executes a script that destroys the LUKS header and shuts down the computer. The tool is intended for use by activists, human rights workers, and others who may face coercion from adversaries such as law enforcement to disclose encryption passwords. Once activated, the data becomes permanently unrecoverable, even with the correct password. Users must configure firewall rules to allow UDP broadcast messages from trusted computers running the client. The system can be repurposed to execute other shell scripts and perform different actions beyond LUKS header destruction. The tool requires careful backup management, including storing encrypted backups and original LUKS headers in secure locations before deployment.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A demonstration of a method to delete a locked executable or currently running file from disk.
BleachBit is an open-source system cleaning utility that removes temporary files and system artifacts to free disk space and protect user privacy.
A steganographic file system in userspace for plausible deniability of files.
A database protection suite that provides field-level encryption, access control, and intrusion detection for distributed applications storing sensitive data.
Steganography brute-force utility with performance issues, deprecated in favor of stegseek.
Red October is a TLS-based encryption server that implements two-man rule authorization, requiring multiple users to collaborate for cryptographic operations.
Steghide is a steganography program that hides data in image and audio files.
A tool for securely backing up and versioning production secrets or shared passwords
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.