If you're just trying to securely wipe the slack space of the drive, i.e. the sectors that are free after file deletion, there are a few easy ways to do it.
On Windows, you can use cipher /W:C:\
(replace C for the drive letter you're targeting) to perform secure deletion of the free sectors. This should work fine for HDDs, and even implements (arguably pointless) multi-pass wiping.
For Linux, you can use the secure-delete
tool, which should be available from your package repository. There's an answer on SuperUser that covers this. Again, this supports multi-pass wiping, but it's unnecessary.
Keep in mind that if your external drive is running over USB it will be slow. If possible, remove it and hook it up to the computer directly, e.g. via SATA. This will massively increase the disk throughput.
If the external drive is an SSD, things get more complicated. SSDs are built out of special flash cells which have limited write capacity; once you write to them a few million times they'll burn out. In order to make the lifespan of these devices more useful, two main techniques are used. The first is wear levelling, which involves distributing the writes across different cells, and storing a map to these fragmented instances of data. This helps solve cases where a single file is written to frequently, which would normally result in the same cell being written over and over, causing premature burnout. Unfortunately this also means that you can't guarantee that a file write will actually overwrite the same physical cell, so you can't guarantee that you've wiped the data. The other technique involves providing redundant cells which can be used to help increase the lifespan of the disk. When a cell is detected to be faulty (usually through burnout) it is re-mapped to a redundant cell. Unfortunately this means that old data might be left behind on the old cell, which also leads to leakage.
In order to provide some form of secure deletion method on SSDs that works despite the life extension mechanisms, without resorting to extensive erasure operations, manufacturers encrypt all data that goes onto the sectors with a strong block cipher such as AES. The key for the encrypted data is stored on the device, and the encryption / decryption is entirely transparent to the operating system. When the user wishes to securely wipe the device, the operating system can send a special command to the drive which causes it to generate a new key and overwrite the old one. This renders all data on the device, redundant or not, entirely unreadable, without ever writing over the cells. Unfortunately this results in deleting everything from the disk, including all partitions. There's no way to do a partial secure delete - you'd have to copy the files you want to keep over to another disk, then wipe it, then bring the files back over.
Actually doing this secure deletion operation is usually dependant on the device, but most manufacturers provide tools or instructions on how to do it.