Dorothy Logo

Dorothy

0
Free
Visit Website

Created by David French (@threatpunter) at Elastic Security, Dorothy is a tool designed to help security teams test their monitoring and detection capabilities for their Okta environment. It offers modules to simulate attacker actions and security audit actions in an Okta environment, mapped to relevant MITRE ATT&CK® tactics like persistence, defense evasion, and discovery. Elastic Security's free detection rules for Okta can be found in their detection-rules repository. It is recommended to use Dorothy in a test environment to avoid any impact on the production environment.

FEATURES

ALTERNATIVES

Repository containing IoCs related to Volexity's threat intelligence blog posts and tools.

An Open Source solution for management of Threat Intelligence at scale, integrating multiple analyzers and malware analysis tools.

Automatically curate open-source Yara rules and run scans with YAYA.

Official repository of YARA rules for threat detection and hunting

Parse IOCs from text

A collection of APT and cybercriminals campaigns with various resources and references.

Repository for detection content with various types of rules and payloads.

Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.