A categorized breakdown of all tools included in the Damage repository. Use responsibly and only in safe, sandboxed environments.
These scripts simulate or trigger system-level disruption. Use only in isolated virtual machines.
| Tool Name | Description | Risk Level |
|---|---|---|
BootloopTrap |
Creates an infinite system restart loop via registry edits | ☠️ Critical |
CorePurge |
Attempts to delete core system files and force shutdown | ☠️ Critical |
FileRuin |
Recursively renames and appends "corruption" messages | ☠️ Critical |
ForkBombLite |
Spawns endless Notepad processes to simulate system overload | |
NetNull |
Releases/flushes IP settings and network configs | |
SysDoom |
Mimics severe system sabotage and registry persistence | ☠️ Critical |
ZeroSector |
Simulates boot sector deletion (non-functional) |
Harmless scripts designed to confuse or surprise the user.
| Tool Name | Description | Risk Level |
|---|---|---|
GhostPing |
Sends pings in a loop; slows system | 🟢 Low |
PhantomNote |
Opens Notepad and simulates ghost-typing "I'm Here!" | 🟢 Low |
Rebooter |
Forces unexpected reboot | |
TimeBomb |
Countdown to payload trigger |
Simulated monitoring or keystroke logging for learning purposes.
| Tool Name | Description | Risk Level |
|---|---|---|
EchoKey |
Simulates a keylogger using choice and logs to notepad |
⚠️ All tools are for educational use only. Do not deploy these on live systems. Always test in VMs or controlled labs.