Tools

Public listings. Clear access on every row.

Nora's Law is the platform and framework we publish — not legislation and not a vote. Browse tools and documentation without an account. Heavier compute, sensitive uploads, or collaboration may require verification; the listing stays public so you can decide before you apply.

Full tool set (in roadmap order): evidence-organizer, timeline-builder, document-forensics. Available listings include step-by-step guides, workflow examples, and plain-language access notes on each page.

Need verified collaboration or higher compute? Start at Community or Join.

Available

Fully documented listings with step-by-step guides and plain-language access notes. Execution may require local install or verified access — check the distribution label on each page.

Evidence Organizer

v1.0.0Available
Access: verified for sensitive / higher-cost runsSetup: Built-inDifficulty: easyShip: available — inspect access + distribution before a deadline

Includes example excerpt or wireframe on detail page

Structure your evidence by date, source, and relevance. Tag documents, build connections between events, and create a searchable archive of everything you have.

You have a box of documents, emails, and screenshots. This turns it into a case.

Open tool detail →

Timeline Builder

v1.0.0Available
Access: verified for sensitive / higher-cost runsSetup: Built-inDifficulty: easyShip: available — inspect access + distribution before a deadline

Includes example excerpt or wireframe on detail page

Construct chronological timelines from your evidence. Visualize gaps, identify patterns, and produce timeline exhibits for counsel review.

When the other side says that never happened — you show them when it happened, in order, with sources.

Open tool detail →

Document Forensics

v1.0.2Available
Access: public listing — execution path may still be local or gatedSetup: 5 minutesDifficulty: moderateShip: available — inspect access + distribution before a deadline

Includes example excerpt or wireframe on detail page

Analyze PDF metadata to verify document authenticity. Identify creation software, authorship, modification history, and chain-of-custody gaps.

This is how I proved that seven lab reports were created on a desktop computer — not in a laboratory.

Open tool detail →

In development

Public listings; behavior and access may change. Expect compute limits or partial runs where noted.

Coming soon

Roadmap commitments only—not shipped features yet.

Public tools require public support.

Help us maintain the infrastructure that keeps evidence preservation and research tools free, auditable, and available to the next person facing a fight alone.

Fund Public Access →
Support the work →