GET /api/featured_api/28/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"url": "https://unprotect.it/api/featured_api/28/?format=api",
"library": {
"id": 1,
"name": "Kernel32.dll",
"description": ""
},
"name": "CreateToolhelp32Snapshot",
"ref_link": "https://learn.microsoft.com/en-us/windows/win32/api/tlhelp32/nf-tlhelp32-createtoolhelp32snapshot?WT.mc_id=SEC-MVP-5005282",
"from_msdn": true,
"caution_level": "medium",
"description": "",
"featured_in": [
{
"id": 90,
"name": "Parent Process Detection",
"url": "https://unprotect.it/technique/parent-process-detection/"
},
{
"id": 109,
"name": "SuspendThread",
"url": "https://unprotect.it/technique/suspendthread/"
},
{
"id": 111,
"name": "Thread Execution Hijacking",
"url": "https://unprotect.it/technique/thread-execution-hijacking/"
},
{
"id": 113,
"name": "APC injection",
"url": "https://unprotect.it/technique/apc-injection/"
},
{
"id": 114,
"name": "Atom Bombing",
"url": "https://unprotect.it/technique/atom-bombing/"
},
{
"id": 131,
"name": "Kill Process",
"url": "https://unprotect.it/technique/kill-process/"
},
{
"id": 168,
"name": "Detecting Online Sandbox",
"url": "https://unprotect.it/technique/detecting-online-sandbox/"
},
{
"id": 172,
"name": "Killing Windows Event Log",
"url": "https://unprotect.it/technique/killing-windows-event-log/"
},
{
"id": 173,
"name": "Access Token Manipulation: Parent PID Spoofing",
"url": "https://unprotect.it/technique/access-token-manipulation-parent-pid-spoofing/"
}
]
}