GET /api/featured_api/12/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"url": "https://unprotect.it/api/featured_api/12/?format=api",
"library": {
"id": 1,
"name": "Kernel32.dll",
"description": ""
},
"name": "CreateProcessW",
"ref_link": "https://learn.microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-createprocessw?WT.mc_id=SEC-MVP-5005282",
"from_msdn": true,
"caution_level": "medium",
"description": "",
"featured_in": [
{
"id": 88,
"name": "Process Hollowing, RunPE",
"url": "https://unprotect.it/technique/process-hollowing-runpe/"
},
{
"id": 113,
"name": "APC injection",
"url": "https://unprotect.it/technique/apc-injection/"
},
{
"id": 167,
"name": "File Melt",
"url": "https://unprotect.it/technique/file-melt/"
},
{
"id": 178,
"name": "ProcEnvInjection - Remote code injection by abusing process environment strings",
"url": "https://unprotect.it/technique/procenvinjection-remote-code-injection-by-abusing-process-environment-strings/"
},
{
"id": 208,
"name": "NLS Code Injection Through Registry",
"url": "https://unprotect.it/technique/nls-code-injection-through-registry/"
}
]
}