Burton / Analysis-of-Competing-HypothesesLinks
An analytic technique created at the CIA, ACH helps you analyze complex situations with multiple hypotheses and countless pieces of evidence. Multiple people can collaborate on a single problem, and ACH will compare everyone's analyses and pinpoint the precise areas of disagreement, allowing for a more focused debate.
☆104Updated 13 years ago
Alternatives and similar repositories for Analysis-of-Competing-Hypotheses
Users that are interested in Analysis-of-Competing-Hypotheses are comparing it to the libraries listed below
Sorting:
- Web crawling and document processing through a usable interface.☆72Updated 7 years ago
- Your Access To Data☆73Updated 2 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆14Updated 2 years ago
- Simple NLP and bulk OCR text processing script suite.☆47Updated 6 years ago
- Baseline organizational policies and practices☆10Updated 8 years ago
- Faceted search engine for domain-specific exploration of the Web☆45Updated 8 years ago
- Intuitive and configurable search interface for document archives.☆201Updated 5 years ago
- Resume data and scripts for managing it☆91Updated 8 years ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆80Updated 2 weeks ago
- DEPRECATED USE v3!☆59Updated 9 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Updated 8 years ago
- The Digital First Aid Kit has moved to Gitlab:☆109Updated 5 years ago
- USB key cleaner☆62Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - Some good software for those concerned about their OPSEC. Geared towards journalists, but good fo…☆95Updated 6 years ago
- Notes and reference for ongoing forecasting.☆16Updated 3 years ago
- Every document published from the Snowden archive☆69Updated 10 years ago
- netgrafio - Visualize your network☆328Updated 10 years ago
- Open source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to …☆67Updated 2 years ago
- Plugin based information gathering library☆27Updated 2 years ago
- Open source eDiscovery☆114Updated 2 weeks ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Network Defender Toolkit☆18Updated 12 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Advices to look for malicious software on your devices☆17Updated 5 years ago
- Maltego Transforms to Query Traffic Records☆34Updated 9 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Updated 9 years ago
- MITIE: library and tools for information extraction☆29Updated 10 years ago
- Collection of IOCs related to targeting of civil society☆189Updated 3 years ago
- Simple NGram Fast Indexer & Searcher☆37Updated 2 years ago