Burton / Analysis-of-Competing-Hypotheses
An analytic technique created at the CIA, ACH helps you analyze complex situations with multiple hypotheses and countless pieces of evidence. Multiple people can collaborate on a single problem, and ACH will compare everyone's analyses and pinpoint the precise areas of disagreement, allowing for a more focused debate.
☆104Updated 13 years ago
Alternatives and similar repositories for Analysis-of-Competing-Hypotheses:
Users that are interested in Analysis-of-Competing-Hypotheses are comparing it to the libraries listed below
- Web crawling and document processing through a usable interface.☆71Updated 7 years ago
- Open source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to …☆68Updated 2 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆14Updated 2 years ago
- Baseline organizational policies and practices☆10Updated 8 years ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆79Updated last month
- USB key cleaner☆60Updated 7 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 9 years ago
- Simple NLP and bulk OCR text processing script suite.☆47Updated 6 years ago
- Resume data and scripts for managing it☆91Updated 8 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- Your Access To Data☆73Updated 2 years ago
- ☆31Updated 5 years ago
- Virus names generator☆28Updated 10 years ago
- A platform for collaborative social media verification☆55Updated 8 years ago
- The Digital First Aid Kit has moved to Gitlab:☆109Updated 5 years ago
- DEPRECATED. Desktop graph visualization application☆50Updated 2 years ago
- Advices to look for malicious software on your devices☆17Updated 5 years ago
- Automated generation of powerpoint slides for fun and profit☆13Updated 7 years ago
- DEPRECATED USE v3!☆59Updated 9 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Updated 10 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆24Updated 8 years ago
- Collection of IOCs related to targeting of civil society☆190Updated 3 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Fun with Amazon AWS and Maltego☆29Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - Some good software for those concerned about their OPSEC. Geared towards journalists, but good fo…☆95Updated 6 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Dataspec for SII☆10Updated 8 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- A Python implementation of our efficient Bloom filter library.☆29Updated 5 years ago
- Python static blog generator☆42Updated 8 years ago