SecureWipe is an open-source, cross-platform data wiping system focused on verifiable and standards-compliant data erasure across a wide range of storage devices.
It supports HDDs, SSDs, NVMe drives, removable USB storage, and Android devices, and is designed to perform complete, irreversible data destruction, not just filesystem-level deletion.
SecureWipe runs on a 64-bit Tiny Core Linux base to keep the environment minimal, fast, and hardware-tolerant, making it usable on both modern systems and older machines without relying on vendor-specific tooling.
The project follows NIST SP 800-88 data sanitization guidelines and produces cryptographically verifiable wipe records that can be audited or validated later. These records support reproducible erasure workflows, compliance verification, and responsible device reuse or disposal.
-
Full Disk Wipe — ATA Secure Erase for HDDs, NVMe Secure Erase for SSDs
-
Android Wipe — Automated ADB + Fastboot reset for complete data removal
-
USB Wipe — File-system signature wiping using the
ddprotocol -
Tamper-Proof Certificates — Verifiable proof of secure erasure
-
Offline Operation — Works entirely without internet access
-
Lightweight — Tiny Core Linux base for minimal system resource usage
-
Visit the official SecureWipe website.
-
Download the latest SecureWipe ISO file.
-
Download and install Rufus.
-
Insert a USB drive (minimum 4 GB).
-
Open Rufus and configure:
-
Device: Select your USB drive
-
Boot selection: Choose the downloaded
SecureWipe.iso -
Partition scheme: Choose
MBR(Legacy BIOS) orGPT(UEFI) based on your device.
- Click Start and wait for Rufus to finish creating the bootable USB.
-
Insert the USB drive into the target computer.
-
Restart and open the boot menu (
F12,Esc, orDeldepending on the system). -
Select your USB device to boot into SecureWipe.
Once the SecureWipe interface loads, select an option:
-
Wipe Internal Disk (HDD/NVMe)
-
Wipe USB Devices
-
Wipe Android Devices
Follow the on-screen prompts. After completion, SecureWipe automatically generates a wipe certificate which will be stored on the Pendrive.
-
Download the
SecureWipe.isofile. -
Identify your USB drive (e.g.,
/dev/sdb). -
Use the
ddcommand to make a bootable USB:
sudo dd if=SecureWipe.iso of=/dev/sdX bs=4M status=progress conv=fsyncReplace /dev/sdX with your actual USB device path (not a partition like /dev/sdb1). Reboot your system and select the USB device from the boot menu.
Download the securewipe.deb package from the official website. Install it using:
sudo dpkg -i securewipe.deb
sudo apt-get install -fLaunch SecureWipe with:
securewipeFollow the interface to securely wipe supported devices.
- Enable USB Debugging in Developer Options before connecting.
- Ensure the phone is properly recognized by ADB.
After each successful operation, SecureWipe creates a digital wipe certificate that includes:
- Device name and serial number
- Wipe timestamp
- Wipe method (ATA, NVMe, ADB, or dd)
- Verification checksum
- Operator ID (if configured)
These certificates act as tamper-proof audit records, providing verifiable proof of data erasure for organizations and compliance audits.
- All data will be permanently erased. Back up any critical data before proceeding.
- Use SecureWipe only on devices you own or are authorized to wipe.
- Some older HDDs may not support ATA Secure Erase commands. Guttman method will be employed which may take some time.