suicideCrypt is a data protection tool that creates encrypted volumes with self-destruction capabilities. The tool generates cryptographically strong encrypted volumes that automatically destroy themselves when tampering is detected or when a specific command is issued. The system includes a daemon component that monitors system events and can trigger data destruction based on configurable parameters. When activated, the destruction process executes rapidly and renders the encrypted data unrecoverable by both adversaries and the original volume owner. The tool was developed as an alternative to expensive hardware-based self-destructing drives that use custom AES chips. Instead of requiring specialized hardware, suicideCrypt provides similar functionality through software implementation, offering a more cost-effective solution for scenarios requiring assured data destruction. The destruction mechanism is designed to be auditably unrecoverable, meaning that once triggered, the data cannot be restored through any known recovery methods. This makes it suitable for environments where data must be completely eliminated under specific circumstances.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Proton Pass is a cross-platform password manager that provides encrypted storage, password generation, and security monitoring features with integrated 2FA and dark web monitoring capabilities.
A PHP library that provides secure data encryption capabilities using keys or passwords, designed to minimize implementation errors.
A tool for securely backing up and versioning production secrets or shared passwords
TestDisk checks disk partitions and recovers lost partitions, while PhotoRec specializes in recovering lost pictures from digital camera memory or hard disks.
GPG Sync is a tool designed to keep OpenPGP public keys up-to-date within an organization by offloading the complexity of key management to a single trusted person.
A demonstration of a method to delete a locked executable or currently running file from disk.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.