Wiper Toolkit Logo

Wiper Toolkit

0
Free
Visit Website

Toolkit to perform secure destruction of sensitive virtual data, temporary files, and swap memories. It offers an interactive mode for easier personal data destruction tasks and can be automated through the CLI mode. Users can configure their own overwrite method by choosing between ones, zeros, and/or random data methods as many times as needed.

FEATURES

ALTERNATIVES

Realtime privacy monitoring service for smartphones that analyzes how apps handle private information.

de4dot is a .NET deobfuscator and unpacker with the ability to restore packed and obfuscated assemblies to their original form.

A project focusing on deconstructing and utilizing data for security using Python modules like IPython, Pandas, and Scikit Learn.

A machine learning-based approach to detect and prevent data breaches using natural language processing and machine learning algorithms.

A reverse proxy solution that provides data access control, monitoring, and security policy enforcement for databases and APIs within organization's infrastructure.

Commercial

A tool for creating cryptographically strong volumes that destroy themselves upon tampering or via issued command.

A powerful tool for searching and scraping data from GitHub

Microsoft Azure's dedicated HSM for secure key management and cryptographic operations.