Skip to content
/ Damage Public

A collection of destructive, prank, and surveillance batch/VBS scripts for ethical hacking education. Use in isolated environments only.

License

Notifications You must be signed in to change notification settings

Push4ck/Damage

Damage

Welcome to Damage, an immersive and ethical hacking playground that empowers cybersecurity enthusiasts to explore the intricacies of computer security responsibly. With a keen focus on education and ethical usage, Damage provides a safe environment for understanding vulnerabilities and enhancing digital defenses.


🚀 Key Features

1. Ethical Learning

Embark on a journey of responsible hacking, where curiosity meets ethical guidelines. Discover potential security weaknesses and develop strategies to fortify your systems against real-world threats. By engaging in ethical learning, you become an integral part of safeguarding digital landscapes.

2. Empower Yourself

Whether you are a cybersecurity student, an IT professional, or simply a tech enthusiast, Damage equips you with the knowledge and tools to build a solid foundation in cybersecurity concepts and best practices. Gain hands-on experience to thrive in the dynamic world of cybersecurity.

3. Safe Environment

Damage prioritizes safety and responsibility. All tools are designed solely for educational purposes, ensuring no malicious content is present. Learn, test, and experiment in a controlled, secure environment that ensures no harm to systems or individuals.


🧰 Tools Included

Destructive Tools (for study in isolated VMs only)

  • BootloopTrap.bat — Creates an infinite system restart loop using registry persistence.
  • CorePurge.bat — Attempts to delete system files and force reboot.
  • FileRuin.bat — Recursively renames and corrupts various file types.
  • ForkBombLite.bat — Lightweight process spawner to simulate overload.
  • NetNull.bat — Disables or flushes network configurations.
  • SysDoom.bat — Simulates critical system-level sabotage.
  • ZeroSector.bat — Mimics boot sector wipe (non-functional simulation).

⚠️ Use these in sandboxed, disposable environments only. Never on real systems.

Non-Destructive / Prank Tools

  • GhostPing.bat — Sends continuous pings, can slow down systems subtly.
  • PhantomNote.vbs (formerly i_am_here) — Opens Notepad and simulates ghost-typing "I'm Here!"
  • Rebooter.bat — Triggers an unexpected reboot.
  • TimeBomb.bat — Executes payload after a set countdown using a loop.

Surveillance Tool

  • EchoKey.bat (formerly KeyLogger.bat) — Captures simulated keystrokes in a notepad log file.

📂 Folder Structure (Updated)

Damage/
├── README.md
└── tools/
    ├── destructive/
    │   ├── BootloopTrap.bat
    │   ├── CorePurge.bat
    │   ├── FileRuin.bat
    │   ├── ForkBombLite.bat
    │   ├── NetNull.bat
    │   ├── SysDoom.bat
    │   └── ZeroSector.bat
    ├── prank/
    │   ├── GhostPing.bat
    │   ├── PhantomNote.vbs
    │   ├── Rebooter.bat
    │   └── TimeBomb.bat
    └── surveillance/
        └── EchoKey.bat

🤝 Contribution Guidelines

We believe in the power of collaboration. We warmly welcome contributions from the cybersecurity community to enhance this platform. Whether it's bugs, ideas, or new ethical tools—submit a pull request or open an issue.


🛡️ Legal Disclaimer

Damage is intended strictly for ethical and educational purposes. By using this repository, you agree to comply with all applicable laws. The developers assume no liability for any misuse or damage caused by any part of this project.


🚀 Getting Started

  1. Clone the repository.
  2. Read the README files and tool comments.
  3. Use a virtual machine or sandboxed lab to test destructive scripts.
  4. Never run these tools on personal or production systems.

🎓 Learning Resources

Explore a range of security-focused materials:


📝 Documentation

Each tool contains embedded comments for understanding functionality and consequences. Consider reading each script before execution.

Ethical hacking promotes responsible exploration to protect and defend systems, not harm them.

About

A collection of destructive, prank, and surveillance batch/VBS scripts for ethical hacking education. Use in isolated environments only.

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks