Skip to content

Latest commit

 

History

History
46 lines (31 loc) · 2.25 KB

File metadata and controls

46 lines (31 loc) · 2.25 KB

🧰 Tool Index - Damage

A categorized breakdown of all tools included in the Damage repository. Use responsibly and only in safe, sandboxed environments.


🔥 Destructive Tools

These scripts simulate or trigger system-level disruption. Use only in isolated virtual machines.

Tool Name Description Risk Level
BootloopTrap Creates an infinite system restart loop via registry edits ☠️ Critical
CorePurge Attempts to delete core system files and force shutdown ☠️ Critical
FileRuin Recursively renames and appends "corruption" messages ☠️ Critical
ForkBombLite Spawns endless Notepad processes to simulate system overload ⚠️ High
NetNull Releases/flushes IP settings and network configs ⚠️ High
SysDoom Mimics severe system sabotage and registry persistence ☠️ Critical
ZeroSector Simulates boot sector deletion (non-functional) ⚠️ High

😜 Prank Tools

Harmless scripts designed to confuse or surprise the user.

Tool Name Description Risk Level
GhostPing Sends pings in a loop; slows system 🟢 Low
PhantomNote Opens Notepad and simulates ghost-typing "I'm Here!" 🟢 Low
Rebooter Forces unexpected reboot ⚠️ Medium
TimeBomb Countdown to payload trigger ⚠️ Medium

🕵️ Surveillance Tools

Simulated monitoring or keystroke logging for learning purposes.

Tool Name Description Risk Level
EchoKey Simulates a keylogger using choice and logs to notepad ⚠️ Medium

⚠️ All tools are for educational use only. Do not deploy these on live systems. Always test in VMs or controlled labs.