The database does not contain executable code of any sort (unless a plugin allows for this and if they did you would not want that plugin). There should be no need to "nuke" the database tables or the data.
You can though take the SQL file of the database dump and scan it with malware and anti-virus software just to be on the same side.
Files stored in the wp-content folder (and all the sub folders) is more likely to have compromised data. Depending on the write permissions on the server, anything can be infected including themes, plugins and other config files. Please search the web for tips how to deal with that as that topic is beyond what we discuss here in the blubrry forums.
As far as PowerPress is concerned, as long as you deleted the plugins/powerpress folder and re-install it from wordpress.org you're all set. As for PowePress database records, settings are stored in the options table, all options are prefixed with powerpress_. Episode data is stored in the post meta table in the filed name "enclosure". If you had custom podcast channels or custom post type podcasting enabled in PowerPress, additional channel/post type episode information would be stored with a prefix _enclosure