Dorothy Logo

Dorothy

Dorothy is a tool to test monitoring and detection capabilities for Okta environments, with modules mapped to MITRE ATT&CK® tactics.

191
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Dorothy Description

Created by David French (@threatpunter) at Elastic Security, Dorothy is a tool designed to help security teams test their monitoring and detection capabilities for their Okta environment. It offers modules to simulate attacker actions and security audit actions in an Okta environment, mapped to relevant MITRE ATT&CK® tactics like persistence, defense evasion, and discovery. Elastic Security's free detection rules for Okta can be found in their detection-rules repository. It is recommended to use Dorothy in a test environment to avoid any impact on the production environment.

Dorothy FAQ

Common questions about Dorothy including features, pricing, alternatives, and user reviews.

Dorothy is Dorothy is a tool to test monitoring and detection capabilities for Okta environments, with modules mapped to MITRE ATT&CK® tactics.. It is a Threat Management solution designed to help security teams with MITRE Attack, Detection Rules.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

GoSecure Titan® Adversarial Simulation Logo

Human-led adversary emulation service testing detection & response capabilities

0
NetSPI Detective Controls Testing Logo

Validates detective security controls through attack simulations and testing

0
Leonidas Logo

A framework for executing cloud attacker tactics, techniques, and procedures (TTPs) that can generate APIs, Sigma detection rules, and documentation from YAML-based definitions.

0
MITRE Caldera™ Logo

MITRE Caldera™ is an automated adversary emulation platform built on the MITRE ATT&CK framework that supports red team operations and incident response activities through a modular C2 server and plugin architecture.

0
ZAIUX ZAIUX® Evo Logo

SaaS BAS platform automating C2 attacks with AI-driven remediation plans

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox