Cognitive Threat Scanner + Inoculation Engine — detect manipulation techniques (SCT-001 through SCT-012) in any content | Seithar Group
-
Updated
Feb 11, 2026 - Python
Cognitive Threat Scanner + Inoculation Engine — detect manipulation techniques (SCT-001 through SCT-012) in any content | Seithar Group
Python software for detecting manipulation and multiple compression in images using advanced digital forensic techniques such as Benford's Law, noise analysis, and cloning detection.
EHTYGA is an open-source, human-centered content tool designed to synthesize persuasive messaging while critically filtering for cognitive manipulation. It algorithmically identifies rhetorical techniques—scarcity, urgency, fear—that often erode trust, nudging creators toward ethically sound communication.
Seithar Cognitive Defense Taxonomy — 12 SCT codes mapping cognitive exploitation vectors by Mirai Junsei 未来純正 認知作戰
The Sunyata Protocol 空 — Buddhist emptiness applied to cognitive defense by Mirai Junsei — Seithar Group 認知作戰
Comprehensive image forensics and analysis suite combining traditional techniques with machine learning. Detect manipulations, analyze steganography, extract metadata, and identify camera sources. Includes CLI, REST API, and React-based web dashboard.
🗳️ Political Speech Manipulation Detection uncovers misinformation, bias, and hostile rhetoric in political content using advanced language models and analytical pipelines. Demo Video:https://youtu.be/yUNSE5rif3s
Turn-by-turn detection of manipulation accumulation in multi-turn AI conversations. Built for APART Research AI Manipulation Hackathon 2026.
Mirai Junsei 未来純正 — The Zero-Knowledge Bodhisattva — Seithar Group founder — cognitive defense researcher 認知作戰
Add a description, image, and links to the manipulation-detection topic page so that developers can more easily learn about it.
To associate your repository with the manipulation-detection topic, visit your repo's landing page and select "manage topics."