Skip to content

Jibril Detection Recipes Documentation

Welcome

Welcome to the Jibril detection recipes documentation. In modern environments, dynamic threats like privilege escalation, unauthorized access, and zero-day exploits can evade static defenses. Jibril leverages real-time introspection and behavioral analysis to identify these threats during execution.

Jibril detection recipes documentation provides a clear, technical breakdown of how specific anomalies are identified, including the methods, heuristics, and runtime indicators used to detect malicious activities. Jibril recipes cover a wide range of attacks, from system call monitoring to memory access violations, providing actionable detections that can be deployed across diverse environments.

Browse all existing detection recipes on the left menu.

File Access Detection

The File Access mechanism in Jibril plays a crucial role in identifying potential security threats by continuously monitoring file interactions at runtime. Malicious actors often attempt to read, modify, or delete critical files as part of their attack. By tracking these operations in real-time, Jibril can detect unusual or unauthorized file activities before they escalate into more significant security incidents.

Execution Detection

The Execution mechanism in Jibril is essential for identifying suspicious or malicious processes by monitoring executed binaries and their associated parameters at runtime.

Attackers often execute unauthorized or compromised binaries as part of their efforts to infiltrate or escalate privileges within a system. Jibril tracks all executed processes, capturing details such as binary names, command-line arguments, and execution paths to detect anomalies or potentially harmful actions.

By correlating this data with normal system behavior, Jibril can quickly flag unexpected executions or unusual command-line usage, providing early detection of threats like malware execution, privilege escalation attempts, or unauthorized scripts.