Bootable USB · Offline · No Cloud Required

DRIVENUKE

Certified data erasure for IT professionals. Boot, wipe, and generate a signed certificate — all without touching a network.

Download ISO See How It Works
[DriveNuke] Hardware probe complete
Samsung 970 PRO 1TB NVMe /dev/nvme0n1 DETECTED
WD Elements 8TB USB /dev/sda EXTERNAL
[DriveNuke] Boot device protected: /dev/sdb (marker found)
[DriveNuke] NVMe Sanitize → SUCCESS · Certificate generated
3 Wipe Methods Per Drive Type
100% Offline — No Network Required
PDF Certificate Per Drive
ISO Boots on Any x86-64 System

Process

Three Steps.
One Certificate.

01
🔌

Boot from USB

Insert the DriveNuke USB into any x86-64 machine and boot. The kiosk UI launches automatically — no installation, no login.

02
📋

Enter Job Info

Fill in customer name, operator, and asset tags. DriveNuke auto-detects all drives and protects the boot USB from accidental erasure.

03
🔥

Wipe & Certify

Confirm, count down, and wipe. DriveNuke selects the strongest available method per drive and generates a signed PDF certificate for each.

04
📁

Retrieve Records

Remove the USB and plug into your workstation. Certificates and the CSV activity log are stored on the USB's persistence partition.

Technical Spec

Hardware-Aware
Erasure Logic

DriveNuke detects each drive's type and attempts the strongest supported method first, falling back automatically if the hardware doesn't support it.

NVMe SSD

NVMe Sanitize

Cryptographic or block-level erase initiated directly by the controller firmware.

  • NVMe Sanitize (Crypto Erase)
  • NVMe Format Secure Erase
  • 1-Pass Zero Overwrite (fallback)
SATA SSD / HDD

ATA Secure Erase

ATA security commands that instruct the drive to erase its own flash cells or magnetic platters.

  • ATA Enhanced Secure Erase
  • ATA Secure Erase
  • 1-Pass Zero Overwrite (fallback)
HDD / USB

Zero Overwrite

Full sector-by-sector overwrite with zeros via dd, with direct I/O to bypass OS caches.

  • dd if=/dev/zero (oflag=direct)
  • conv=noerror,sync
  • Post-wipe sync verification
DriveNuke Certificate of Data Erasure VeritCloud Data Services · veritcloud.com
✓ SUCCESS
Acme Corporation
VC3F9K8P2M7T6R1Q
2025-11-14 09:42
R. Burgoyne
Dell Precision 5820
Samsung 970 PRO (NVMe)
7GX4HK3
S5GXNF0T123456 | 1024 GB
METHOD: NVMe Sanitize (Crypto Erase)  |  VERIFICATION: Post-wipe sync performed

Certificate

A Signed Record
For Every Drive

Each wipe generates a check-sized PDF certificate (8.5 × 3.5"), a machine-readable JSON record, and a plain-text summary — stored offline on the USB persistence partition.

Certificates are customer-branded and include full host system info, drive details, wipe method used, and an honest disclaimer about certification scope.

  • PDF, JSON, and TXT output per drive
  • Customer code in filename and header
  • Append-only CSV activity log per job
  • All data stays on the USB — no cloud sync
  • Preview certificate before wiping

Download

Get DriveNuke

Download the ISO, flash it to a USB drive (4 GB minimum), and boot. Runs entirely offline on any x86-64 system. Build from source or use the pre-built image.

Platform x86-64 (UEFI + Legacy)
Base OS Debian Bookworm Live
USB Size 4 GB minimum
License VeritCloud Internal Use
# Flash to USB after build
sudo ./scripts/build_iso.sh
sudo ./scripts/write_usb.sh
# Boot target machine from USB
Latest Build
drivenuke.iso
Download Source
Source code + build scripts
Requires Debian/Ubuntu to build ISO

Need Certified Erasure?

DriveNuke provides best-effort documentation. For NIST 800-88 or DoD 5220.22-M certified sanitization required by compliance frameworks, ask about upgrading to Bitraser-backed services through VeritCloud.

Contact VeritCloud →