Wiper Toolkit Logo

Wiper Toolkit

0
Free
Updated 11 March 2025
Visit Website

Toolkit to perform secure destruction of sensitive virtual data, temporary files, and swap memories. It offers an interactive mode for easier personal data destruction tasks and can be automated through the CLI mode. Users can configure their own overwrite method by choosing between ones, zeros, and/or random data methods as many times as needed.

FEATURES

SIMILAR TOOLS

A data security platform that provides automated sensitive data discovery, access control, monitoring, and compliance capabilities for organizations managing data across multiple storage platforms.

Commercial

Tool for hiding data inside data and manipulating byte sequences.

A reverse proxy solution that provides data access control, monitoring, and security policy enforcement for databases and APIs within organization's infrastructure.

Commercial

Detect stegano-hidden data in PNG & BMP using zsteg tool.

Pack up to 3MB of data into a tweetable PNG polyglot file.

PII Crawler is a data scanning tool that identifies and locates Personally Identifiable Information in various file types and databases.

Commercial

A demonstration of a method to delete a locked executable or currently running file from disk.

Encode or encrypt strings to various hashes and formats, including MD5, SHA1, SHA256, URL encoding, Base64, and Base85.

GPG Sync is a tool designed to keep OpenPGP public keys up-to-date within an organization by offloading the complexity of key management to a single trusted person.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved