Skip Navigation

Emergency Data & Login Nuke Tool (Bugfish-Nuke)

Hello there!

just updated a previous mentioned tool which has been in discussion here and wanted to share updates on the software status.

The software is in my opinion finished for now and tutorial videos are available, do not hesitate to ask for features if anything is missing.

Github URL: https://github.com/bugfishtm/bugfish-nuke
Documentation: https://bugfishtm.github.io/bugfish-nuke/

Features

  • Instantly erase user data, application traces, and sensitive files in a single click.
  • Secure deletion: Files are overwritten, not just moved to the recycle bin.
  • Clear clipboard contents
  • Flush DNS cache
  • Erase event logs
  • Delete most recently used (MRU) lists
  • Remove thumbnail caches
  • Empty the recycle bin (system default)
  • Set overwrite passes (1 or more) for each deletion:
    • 1 pass: Fast, effective for most cases
    • 3+ passes: Higher security, slower
    • Warning: 0 passes disables overwriting and is NOT recommended
  • Add your own scripts (e.g., batch files) to run alongside the deletion process
    • Example: Dismount VeraCrypt volumes automatically
  • Optional: Corrupt Windows login files after deletion to prevent further access
    • Use with caution: This will render Windows unbootable and require reinstallation
  • Play a custom or built-in music track during deletion
  • Music stops when deletion is complete-useful as an audible signal if you step away
  • Overview of selected actions before launch
  • Settings for post-deletion behavior: auto-close, force restart, etc.
  • Direct links to tutorials and help resources

Security Notes

  • Overwriting: Files are overwritten according to your settings, making recovery nearly impossible.
  • Recycle Bin: Emptied using Windows default; secure overwrite for the bin may be added in future versions.
  • Custom Scripts: Scripts run independently and can be used to automate additional emergency tasks.
  • File Deletion: Files are securely overwritten (unless you set passes to 0), making recovery extremely unlikely.
  • Music Player: It provides an audible signal when the deletion process is finished, useful if you need to leave your computer during an emergency wipe.
  • Use with Caution: Bugfish Nuke is designed for emergency situations. Use with care, especially the destructive system options.

Have a great one
Bugfish

7 comments
  • Have you considered if secure deletion will work as expected when using SSDs or SD Card? I heard the only way to actually delete something is to fill it with gibbirish and format it

    • Really good point. Data Deletion on SSDs and NVMEs are handled differently. (I dont really know about SD Cards but it may be similar)

      NVMA/SSD Data Deletion follows 3 Steps

      • You delete / overwritte a file (overwrite does not really mean the old content is lost on the ssd, it may be in the NAND storage)
      • The TRIM Features starts periodically and markes the data / content you deleted as erased (this functionality can be triggered by software, i will implement this trigger)
      • The problem is the last step, Garbage Collection: This will erase the data finally, and then the probability is REALLY low someone will restore it. Before garbage collection is complete, there are ways to restore with advanced techniques or help of the manufacturer.

      So best is to activate the TRIM Feature when Its implemented on the next update, but this feature will also be auto-executed by the windows system. - Best is to wait hours (its hard to know when garbage collection is finished) after the trim feature has been enabled to be sure garbage collection has deleted the content/files.

      But for security measures it still can help to delete the data, even if the garbage collection is not finished. The risk for recover depends than on how many resources the opponent is ready to acquire to get to that data. It will make the recover process difficult without special forensics software etc.

      Best and most secure way is to encrypt your data at all so none one can access even if they have the files.

7 comments