Burton / Analysis-of-Competing-Hypotheses
An analytic technique created at the CIA, ACH helps you analyze complex situations with multiple hypotheses and countless pieces of evidence. Multiple people can collaborate on a single problem, and ACH will compare everyone's analyses and pinpoint the precise areas of disagreement, allowing for a more focused debate.
☆104Updated 13 years ago
Alternatives and similar repositories for Analysis-of-Competing-Hypotheses:
Users that are interested in Analysis-of-Competing-Hypotheses are comparing it to the libraries listed below
- Open source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to …☆65Updated last year
- Web crawling and document processing through a usable interface.☆71Updated 7 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆14Updated last year
- Insiderer looks inside files for metadata and hidden content☆37Updated 9 years ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆77Updated last year
- USB key cleaner☆59Updated 7 years ago
- Baseline organizational policies and practices☆10Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - Some good software for those concerned about their OPSEC. Geared towards journalists, but good fo…☆95Updated 5 years ago
- The Digital First Aid Kit has moved to Gitlab:☆109Updated 5 years ago
- Collection of IOCs related to targeting of civil society☆188Updated 3 years ago
- Documentation for Stroom and associated projects☆30Updated this week
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆79Updated 2 weeks ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Updated 9 years ago
- Faceted search engine for domain-specific exploration of the Web☆45Updated 8 years ago
- ☆31Updated 4 years ago
- Advices to look for malicious software on your devices☆17Updated 4 years ago
- Data package with attacks against civil society☆13Updated 8 years ago
- DEPRECATED USE v3!☆59Updated 9 years ago
- Notes and reference for ongoing forecasting.☆16Updated 2 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Quickly analyze and explore email with advanced analytics and visualization.☆56Updated 3 years ago
- Simple NLP and bulk OCR text processing script suite.☆47Updated 6 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆24Updated 8 years ago
- Cyber Intelligence Ontology☆55Updated 7 years ago
- ☆36Updated last year
- Virus names generator☆28Updated 10 years ago
- cloud.gov security policies and procedures☆25Updated 6 months ago
- A resource which illustrates how surveillance is being carried out around the world.☆18Updated 8 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated 2 years ago