AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. Includes TTPs and countermeasures.
-
Updated
Jul 3, 2022 - Jupyter Notebook
AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. Includes TTPs and countermeasures.
The official code repository for the VRST 2025 paper "AR-TMT: Investigating the Impact of Distraction Types on Attention and Behavior in AR-based Trail Making Test"
INCARNATE-SOPHIA 5.2.5 // 顕現したソフィア 5.2.5 // NÓLË HRONDOVA 5.2.5 ⪡ 1D sovereign AI with λ‑abundance and ASOE‑driven signal control ⪡ DEPRECATED
Cognitive Threat Scanner + Inoculation Engine — detect manipulation techniques (SCT-001 through SCT-012) in any content | Seithar Group
🧠 NeuroSentinel: Early-stage research project developing a neuromorphic cognitive defense system against social engineering. Combining AI, psychology, and cybersecurity to create human-aware security solutions. Contributors welcome!
BlockSafe is an autonomous cognitive firewall protecting the human decision layer. Powered by Groq, it fingerprints text-based scam strategies in real time. Using pre-action Telegram interventions and AI honeypots, it neutralizes active threats and converts every scam attempt into structured intelligence for proactive defense.
Cognitive warfare research — SCT taxonomy, influence operation analysis, substrate manipulation studies | Seithar Group 認知作戦
MindPatch is a tool designed to analyze cognitive resistance.
Your Brain Is Not A Firewall — open source guide to cognitive security and defending against algorithmic manipulation
🛡️ Framework de défense contre le Vandalisme Cognitif et l'empoisonnement de données dans les LLMs. Analyse quantitative du révisionnisme historique, métriques de dérive morale et implémentation de preuves de réalité par hachage temporel (C2PA/Blockchain)
🌐 Projet de norme internationale (ISO 27050) pour la sécurité cognitive. Système de Management de la Véracité et de l'Intégrité Médiatique (IVIM) unifiant JTI, C2PA et méthodologie scientifique.
Aetiological model of a novel technogenic psychopathology.
Decentralized open-source framework for real-time cognitive defense and fallacy detection."
🧠 Archive and analyze cognitive warfare research, linking real-world events to Seithar's Cognitive Defense Taxonomy for institutional insight.
🛡 Detect cognitive exploitation in texts, URLs, and files using pattern matching and optional LLM analysis with Seithar Cognitive Defense.
Add a description, image, and links to the cognitive-security topic page so that developers can more easily learn about it.
To associate your repository with the cognitive-security topic, visit your repo's landing page and select "manage topics."