ARYWIPE is a cross‑platform data destruction utility designed for permanent, irreversible deletion of sensitive information. Unlike ordinary deletion methods that leave recoverable traces, ARYWIPE uses multi-layer sanitization, cryptographic shredding, and anti-forensic techniques to eliminate any meaningful recovery path.
This tool is intended for:
- Cybersecurity researchers
- Privacy-focused users
- Data sanitization labs
- Digital forensics students (ethical & defensive use only)
- AES‑256 Stream Encryption – Converts file contents into high‑entropy ciphertext.
- Overwrite Engine – Applies Random, DoD 5220.22‑M, or Schneier 7‑Pass overwrite patterns.
- Anti‑Forensic Obfuscation – UUID renaming, timestamp wiping, and attribute clearing.
- Windows → Detection & optional clearing of Volume Shadow Copies (VSS).
- macOS → Detection & removal of local Time Machine snapshots.
- Linux → Handles immutable attributes (
chattr -i).
- Critical path protection (blocks wiping
/,/etc, orC:\Windows). - Symlink firewall (unlinks without touching targets).
- Resident/MFT/Inode inflation to force true block allocation.
- Multi-stage UUID renaming to break directory table reconstruction.
- Timestamp flattening (Unix Epoch / 1980 standard).
- Safe RAM cleanup for sensitive key material.
- PyQt5-based dark interface.
- Real‑time progress tracking.
- Multi-threaded operations without UI freeze.
- Python 3.8+
- Pip
git clone https://github.com/giriaryan694-a11y/ARYWIPE.git
cd ARYWIPE
pip install -r requirements.txtOr manually:
pip install PyQt5 cryptography pyfigletRun the interface:
python main.py| Mode | Passes | Description | Recommended For |
|---|---|---|---|
| Random | AES + 3 | AES encrypt + 3 random overwrites | General secure use |
| Paranoid | AES + 7 | AES encrypt + Schneier 7-pass | Sensitive research data |
| Legacy | AES + 35 | AES encrypt + Gutmann | HDD-only, archival formats |
⚠️ Gutmann is not useful for modern SSD/NVMe.
- Add files/directories.
- Select overwrite algorithm.
- Confirm safety prompt.
- Begin destruction.
- Verify results via logs.
Even advanced wipers cannot overcome certain hardware and OS behaviors:
SSDs may retain ghost blocks due to internal remapping.
- Solution: Use ARYWIPE + Full Disk Encryption (BitLocker / LUKS / FileVault).
NTFS, EXT4, and APFS may preserve metadata in their journals.
- ARYWIPE scrubs filenames & timestamps but cannot rewrite journal internals.
Run as Administrator/Root to remove OS snapshots; otherwise remnants may persist.
- Attribute unlock (
attrib,chattr). - Resident-file inflation (forces full block write).
- AES‑256‑CFB cryptographic shredding.
- Overwrite engine (pattern-based).
- Triple-UUID renaming cycle.
- Timestamp wiping (access, modified, created).
- Truncation to 0 bytes.
- Unlinking from filesystem.
This layered approach ensures maximum resilience against:
- Carving tools
- Partial block recovery
- Directory entry forensics
- Basic to intermediate forensic tools
This tool is provided for ethical, defensive, and educational purposes only. The author is not responsible for misuse or accidental data destruction. Once a file is wiped using ARYWIPE, it cannot be recovered.
MIT License © 2025 – Aryan Giri Free to use, modify, and distribute with proper credit.


