All Projects → elastic → dorothy

elastic / dorothy

Licence: Apache-2.0 License
Dorothy is a tool to test security monitoring and detection for Okta environments

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to dorothy

github-watchman
Monitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (-29.41%)
Mutual labels:  cybersecurity, infosec, red-team, blue-team
Awesome Cybersecurity Blueteam
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (+2360%)
Mutual labels:  cybersecurity, infosec, blue-team
awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
Stars: ✭ 538 (+532.94%)
Mutual labels:  cybersecurity, red-team, blue-team
Slack Watchman
Monitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (+87.06%)
Mutual labels:  cybersecurity, infosec, red-team
Gitlab Watchman
Monitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (+49.41%)
Mutual labels:  cybersecurity, infosec, red-team
juumla
🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (+25.88%)
Mutual labels:  infosec, red-team, blue-team
Blue-Team-Notes
You didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+957.65%)
Mutual labels:  cybersecurity, infosec
SuperLibrary
Information Security Library
Stars: ✭ 60 (-29.41%)
Mutual labels:  cybersecurity, infosec
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (-17.65%)
Mutual labels:  cybersecurity, infosec
rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+80%)
Mutual labels:  cybersecurity, infosec
LAZYPARIAH
A tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (+42.35%)
Mutual labels:  cybersecurity, red-team
pwn-pulse
Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (+48.24%)
Mutual labels:  infosec, red-team
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+237.65%)
Mutual labels:  cybersecurity, infosec
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+151.76%)
Mutual labels:  cybersecurity, infosec
netizenship
a commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-61.18%)
Mutual labels:  cybersecurity, infosec
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-7.06%)
Mutual labels:  cybersecurity, infosec
tutorials
Additional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (-57.65%)
Mutual labels:  cybersecurity, infosec
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (-11.76%)
Mutual labels:  cybersecurity, infosec
incident-response-plan-template
A concise, directive, specific, flexible, and free incident response plan template
Stars: ✭ 288 (+238.82%)
Mutual labels:  cybersecurity, infosec
AutonomousThreatSweep
Threat Hunting queries for various attacks
Stars: ✭ 70 (-17.65%)
Mutual labels:  cybersecurity, infosec

Supported Python Versions Unit Tests Chat PyPI

Dorothy

Created by David French (@threatpunter) at Elastic Security

Dorothy is a tool to help security teams test their monitoring and detection capabilities for their Okta environment. Dorothy has several modules to simulate actions that an attacker might take while operating in an Okta environment and actions that security teams should be able to audit. The modules are mapped to the relevant MITRE ATT&CK® tactics, such as persistence, defense evasion, and discovery.

Learn more about Dorothy and how to get started with it in this blog post or this presentation.

Elastic Security's free detection rules for Okta can be found in our detection-rules repo. You can read this blog post to learn more about how Elastic Security helps with cloud monitoring and detection.

Dorothy can change the configuration of your Okta environment. Consider using Dorothy in a test environment to avoid any risk of impacting your production environment.

Dorothy

Table of Contents

Getting Started

Head on over to the wiki for help installing and running Dorothy.

Questions? Problems? Suggestions?

Reach out in the #security channel in Elastic's Community Slack workspace or open an issue in this repo.

Contributors

Acknowledgements

Justin Ibarra and Ross Wolf - The style and layout of this project is inspired by shell/CLI utilities that they've developed.

Disclaimer

Obtain the proper authorization before using Dorothy in an environment that you do not own and administer. Users take full responsibility for the outcomes of using Dorothy.

Dorothy is licensed under the Apache License Version 2.0.

Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License.

Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages.

How to Contribute

Interested in contributing to Dorothy? Thanks for your interest. Please familiarize yourself with the contribution guide.

Fun Facts

  • Dorothy is a scientific tornado instrument used to analyze data and to radio back information to create an advanced warning system.
  • What is an Okta? A unit of measurement used to describe the amount of cloud cover at a given location in terms of how many eighths of the sky are covered in clouds
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].