Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in general that makes changes to a system for the purposes of hiding information.
BusKill is an open-source hardware and software project that uses a hardware tripwire/dead-man-switch (a usb cable with a magnetic breakaway) to trigger your computer to lock or shutdown if the user is physically separated from their machine.
The following guide describes how BusKill can be configured to wipe the LUKS Header (containing the FDE key) and its metadata. It shows a video demo where the machine wiped the keys & powered-off in <6 seconds, and it includes a post-execution forensic analysis in Kali with bulk_extractor
I realized that I have been tracking a bunch of other tools related in our BusKill docs, and all of them are great candidates for this awesome-anti-forensic list
Would you be open to adding these and also grouping them in a distinct category of tools that are designed specifically to execute an emergency wipe after being triggered by some hardware tripwire? I'd call the new category Emergency Tripwire Tools or similar.