SecureWipe is an open-source, cross-platform data wiping system focused on verifiable and standards-compliant data erasure across a wide range of storage devices.
It supports HDDs, SSDs, NVMe drives, removable USB storage, and Android devices, and is designed to perform complete, irreversible data destruction, not just filesystem-level deletion.
SecureWipe runs on a 64-bit Tiny Core Linux base to keep the environment minimal, fast, and hardware-tolerant, making it usable on both modern systems and older machines without relying on vendor-specific tooling.
The project follows NIST SP 800-88 data sanitization guidelines and produces cryptographically verifiable wipe records that can be audited or validated later. These records support reproducible erasure workflows, compliance verification, and responsible device reuse or disposal.
-
Full Disk Wipe — ATA Secure Erase for HDDs, NVMe Secure Erase for SSDs
-
Android Wipe — Automated ADB + Fastboot reset for complete data removal
-
USB Wipe — File-system signature wiping using the
ddprotocol -
Tamper-Proof Certificates — Verifiable proof of secure erasure
-
Offline Operation — Works entirely without internet access
-
Lightweight — Tiny Core Linux base for minimal system resource usage
-
Visit the official SecureWipe website.
-
Download the latest SecureWipe ISO file.
-
Download and install Rufus.
-
Insert a USB drive (minimum 4 GB).
-
Open Rufus and configure:
-
Device: Select your USB drive
-
Boot selection: Choose the downloaded
SecureWipe.iso -
Partition scheme: Choose
MBR(Legacy BIOS) orGPT(UEFI) based on your device.
- Click Start and wait for Rufus to finish creating the bootable USB.
-
Insert the USB drive into the target computer.
-
Restart and open the boot menu (
F12,Esc, orDeldepending on the system). -
Select your USB device to boot into SecureWipe.
Once the SecureWipe interface loads, select an option:
-
Wipe Internal Disk (HDD/NVMe)
-
Wipe USB Devices
-
Wipe Android Devices
Follow the on-screen prompts. After completion, SecureWipe automatically generates a wipe certificate which will be stored on the Pendrive.
-
Download the
SecureWipe.isofile. -
Identify your USB drive (e.g.,
/dev/sdb). -
Use the
ddcommand to make a bootable USB:
sudo dd if=SecureWipe.iso of=/dev/sdX bs=4M status=progress conv=fsyncReplace /dev/sdX with your actual USB device path (not a partition like /dev/sdb1). Reboot your system and select the USB device from the boot menu.
Download the securewipe.deb package from the official website. Install it using:
sudo dpkg -i securewipe.deb
sudo apt-get install -fLaunch SecureWipe with:
securewipeFollow the interface to securely wipe supported devices.
⚠️ WARNING: The Docker container implementation is currently under development. While USB devices are detected, it is identified as local disks inside the container and the wiping functionality on it is not yet operational. This Docker setup is intended for testing and development purposes only. For production use and to actually wipe USB devices, please run SecureWipe directly on your host system outside of Docker.
- Pull the pre-built image:
docker pull haschwalth00b/securewipe:latest- Run the container:
docker run --rm -it --privileged -v /dev:/dev -v /run/udev:/run/udev securewipe- Clone this repository:
git clone https://github.com/pointblank-club/SecureWipe.git
cd SecureWipe- Build the Docker image:
docker build -t securewipe:latest .- Run the container:
docker run --rm -it --privileged -v /dev:/dev -v /run/udev:/run/udev securewipeNote: The --privileged flag, /dev volume mount, and /run/udev volume mount allow the container to detect and interact with USB devices as local disks.
- Enable USB Debugging in Developer Options before connecting.
- Ensure the phone is properly recognized by ADB.
After each successful operation, SecureWipe creates a digital wipe certificate that includes:
- Device name and serial number
- Wipe timestamp
- Wipe method (ATA, NVMe, ADB, or dd)
- Verification checksum
- Operator ID (if configured)
These certificates act as tamper-proof audit records, providing verifiable proof of data erasure for organizations and compliance audits.
- All data will be permanently erased. Back up any critical data before proceeding.
- Use SecureWipe only on devices you own or are authorized to wipe.
- Some older HDDs may not support ATA Secure Erase commands. Guttman method will be employed which may take some time.