HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"url": "https://unprotect.it/api/featured_api/357/?format=api",
"library": {
"id": 1,
"name": "Kernel32.dll",
"description": ""
},
"name": "ReadProcessMemory",
"ref_link": null,
"from_msdn": true,
"caution_level": "medium",
"description": "",
"featured_in": [
{
"id": 61,
"name": "IsDebugged Flag",
"url": "https://unprotect.it/technique/isdebugged-flag/"
},
{
"id": 88,
"name": "Process Hollowing, RunPE",
"url": "https://unprotect.it/technique/process-hollowing-runpe/"
},
{
"id": 110,
"name": "Reflective DLL injection",
"url": "https://unprotect.it/technique/reflective-dll-injection/"
},
{
"id": 114,
"name": "Atom Bombing",
"url": "https://unprotect.it/technique/atom-bombing/"
},
{
"id": 115,
"name": "Extra Window Memory Injection",
"url": "https://unprotect.it/technique/extra-window-memory-injection/"
},
{
"id": 153,
"name": "ConsoleWindowClass",
"url": "https://unprotect.it/technique/consolewindowclass/"
},
{
"id": 156,
"name": "OLEUM",
"url": "https://unprotect.it/technique/oleum/"
},
{
"id": 161,
"name": "DNS API Injection",
"url": "https://unprotect.it/technique/dns-api-injection/"
},
{
"id": 162,
"name": "Breaking BaDDEr",
"url": "https://unprotect.it/technique/breaking-badder/"
},
{
"id": 170,
"name": "Process Herpaderping",
"url": "https://unprotect.it/technique/process-herpaderping/"
},
{
"id": 178,
"name": "ProcEnvInjection - Remote code injection by abusing process environment strings",
"url": "https://unprotect.it/technique/procenvinjection-remote-code-injection-by-abusing-process-environment-strings/"
},
{
"id": 358,
"name": "Process Argument Spoofing",
"url": "https://unprotect.it/technique/process-argument-spoofing/"
}
]
}