Welcome to Damage, an immersive and ethical hacking playground that empowers cybersecurity enthusiasts to explore the intricacies of computer security responsibly. With a keen focus on education and ethical usage, Damage provides a safe environment for understanding vulnerabilities and enhancing digital defenses.
Embark on a journey of responsible hacking, where curiosity meets ethical guidelines. Discover potential security weaknesses and develop strategies to fortify your systems against real-world threats. By engaging in ethical learning, you become an integral part of safeguarding digital landscapes.
Whether you are a cybersecurity student, an IT professional, or simply a tech enthusiast, Damage equips you with the knowledge and tools to build a solid foundation in cybersecurity concepts and best practices. Gain hands-on experience to thrive in the dynamic world of cybersecurity.
Damage prioritizes safety and responsibility. All tools are designed solely for educational purposes, ensuring no malicious content is present. Learn, test, and experiment in a controlled, secure environment that ensures no harm to systems or individuals.
- BootloopTrap.bat — Creates an infinite system restart loop using registry persistence.
- CorePurge.bat — Attempts to delete system files and force reboot.
- FileRuin.bat — Recursively renames and corrupts various file types.
- ForkBombLite.bat — Lightweight process spawner to simulate overload.
- NetNull.bat — Disables or flushes network configurations.
- SysDoom.bat — Simulates critical system-level sabotage.
- ZeroSector.bat — Mimics boot sector wipe (non-functional simulation).
⚠️ Use these in sandboxed, disposable environments only. Never on real systems.
- GhostPing.bat — Sends continuous pings, can slow down systems subtly.
- PhantomNote.vbs (formerly i_am_here) — Opens Notepad and simulates ghost-typing "I'm Here!"
- Rebooter.bat — Triggers an unexpected reboot.
- TimeBomb.bat — Executes payload after a set countdown using a loop.
- EchoKey.bat (formerly KeyLogger.bat) — Captures simulated keystrokes in a notepad log file.
Damage/
├── README.md
└── tools/
├── destructive/
│ ├── BootloopTrap.bat
│ ├── CorePurge.bat
│ ├── FileRuin.bat
│ ├── ForkBombLite.bat
│ ├── NetNull.bat
│ ├── SysDoom.bat
│ └── ZeroSector.bat
├── prank/
│ ├── GhostPing.bat
│ ├── PhantomNote.vbs
│ ├── Rebooter.bat
│ └── TimeBomb.bat
└── surveillance/
└── EchoKey.bat
We believe in the power of collaboration. We warmly welcome contributions from the cybersecurity community to enhance this platform. Whether it's bugs, ideas, or new ethical tools—submit a pull request or open an issue.
Damage is intended strictly for ethical and educational purposes. By using this repository, you agree to comply with all applicable laws. The developers assume no liability for any misuse or damage caused by any part of this project.
- Clone the repository.
- Read the README files and tool comments.
- Use a virtual machine or sandboxed lab to test destructive scripts.
- Never run these tools on personal or production systems.
Explore a range of security-focused materials:
- TryHackMe
- Hack The Box
- OWASP Projects
- Cybersecurity YouTube channels, blogs, and MOOCs
Each tool contains embedded comments for understanding functionality and consequences. Consider reading each script before execution.
Ethical hacking promotes responsible exploration to protect and defend systems, not harm them.