Skip to content

Secure Anti-Forensics and Total Annihilation of iNformation. Advanced counter-forensics tool to make storage data unrecoverable. Multi-pass wiping, encryption, metadata corruption, file signature masking, and more. Modular, evolving, and privacy-focused.

License

Notifications You must be signed in to change notification settings

franckferman/SATAN2_Cleaner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

Contributors Forks Stargazers Issues License

SATAN2_Cleaner Logo

☢️ SATAN2_Cleaner

Secure Anti-Forensics and Total Annihilation of iNformation.
Because true privacy means erasing beyond recovery — not just pressing delete.

📜 Table of Contents

Click to collapse/expand
  1. 📖 About
  2. 📜 License
  3. 📞 Contact

📖 About

SATAN2_Cleaner is a personal project born from my interest in counter-forensics, privacy, and advanced data destruction.

Originally conceived as a personal tool to securely wipe disks and make recovery impossible in the event of forensic analysis or physical seizure, SATAN2_Cleaner is now evolving towards a public, advanced, and modular solution for cybersecurity professionals, privacy advocates, and anyone seeking reliable and modern data destruction capabilities.

⚙️ The core philosophy behind SATAN2_Cleaner is to go far beyond basic wiping or classical shredding techniques. The aim is to integrate a wide range of counter-forensics methods, designed to confuse, slow down, or even block forensic analysis attempts, making data recovery either impossible or excessively time-consuming and costly.

Key Features & Planned Counter-Forensics Techniques

  • Multi-pass shredding (DoD 5220.22-M, Gutmann, Schneier patterns, configurable random passes).
  • ATA Secure Erase & Enhanced Secure Erase commands for firmware-level erasure when supported.
  • Embedded (nested) encryption: encrypt → overwrite → re-encrypt (configurable multi-layer encryption).
  • Triple-layer encryption with dynamic and embedded keys.
  • Partition scheme obfuscation (corrupting GPT/MBR, hidden/ghost partitions, invalid partition tables).
  • Chained overwrites & misaligned sector wiping (to evade hardware-level recovery and forensic imaging).
  • Volume Shadow Copy poisoning (creating corrupted but "valid" snapshots to mislead analysts).
  • Filesystem implosion (systematic corruption of superblocks, inodes, and metadata structures).
  • Compression/Decompression traps (intentionally corrupted archives as decoys or traps).
  • Steganography-based fake data injection (hidden irrelevant data to divert attention).
  • File Signature Masking (breaking file headers, magic numbers to prevent carving).
  • MACE timestamps scrambling (Modified, Accessed, Created, Entry) — randomization & corruption.
  • Restricted/illegal filenames & non-standard Unicode injection (to destabilize forensic tools and parsers).
  • Broken and misleading log files, fake system traces (to create false trails and waste analyst's time).
  • Cross-linked file fragments & intentional partial overlaps (to prevent file reassembly and integrity analysis).
  • Bad sector simulation & allocation (marking areas as defective to avoid overwriting suspicion or carving attempts).
  • Decoy file injection ("honey files" and misleading artifacts to misdirect analysis efforts).
  • Partial block overwriting (leaving only false fragments to confuse recovery tools).
  • Cluster tip wiping & slack space erasure (ensuring no residual data in partially used blocks).
  • Disk surface "noise" generation (injection of meaningless data to disrupt entropy analysis and carving).

⚙️ Note: SATAN2_Cleaner is currently under private development. The goal is to release a stable, modular, and community-driven version, with pluggable modules for different destruction and anti-forensics strategies — so users can customize and combine techniques based on their specific threat model and operational needs.

📚 License

This project is licensed under the GNU Affero General Public License, Version 3.0. For more details, please refer to the LICENSE file in the repository: Read the license on GitHub

(🔼 Back to top)

📞 Contact

ProtonMail LinkedIn Twitter

(🔼 Back to top)

About

Secure Anti-Forensics and Total Annihilation of iNformation. Advanced counter-forensics tool to make storage data unrecoverable. Multi-pass wiping, encryption, metadata corruption, file signature masking, and more. Modular, evolving, and privacy-focused.

Topics

Resources

License

Stars

Watchers

Forks

Languages