GET /api/featured_api/357/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "https://unprotect.it/api/featured_api/357/?format=api",
    "library": {
        "id": 1,
        "name": "Kernel32.dll",
        "description": ""
    },
    "name": "ReadProcessMemory",
    "ref_link": null,
    "from_msdn": true,
    "caution_level": "medium",
    "description": "",
    "featured_in": [
        {
            "id": 61,
            "name": "IsDebugged Flag",
            "url": "https://unprotect.it/technique/isdebugged-flag/"
        },
        {
            "id": 88,
            "name": "Process Hollowing, RunPE",
            "url": "https://unprotect.it/technique/process-hollowing-runpe/"
        },
        {
            "id": 110,
            "name": "Reflective DLL injection",
            "url": "https://unprotect.it/technique/reflective-dll-injection/"
        },
        {
            "id": 114,
            "name": "Atom Bombing",
            "url": "https://unprotect.it/technique/atom-bombing/"
        },
        {
            "id": 115,
            "name": "Extra Window Memory Injection",
            "url": "https://unprotect.it/technique/extra-window-memory-injection/"
        },
        {
            "id": 153,
            "name": "ConsoleWindowClass",
            "url": "https://unprotect.it/technique/consolewindowclass/"
        },
        {
            "id": 156,
            "name": "OLEUM",
            "url": "https://unprotect.it/technique/oleum/"
        },
        {
            "id": 161,
            "name": "DNS API Injection",
            "url": "https://unprotect.it/technique/dns-api-injection/"
        },
        {
            "id": 162,
            "name": "Breaking BaDDEr",
            "url": "https://unprotect.it/technique/breaking-badder/"
        },
        {
            "id": 170,
            "name": "Process Herpaderping",
            "url": "https://unprotect.it/technique/process-herpaderping/"
        },
        {
            "id": 178,
            "name": "ProcEnvInjection - Remote code injection by abusing process environment strings",
            "url": "https://unprotect.it/technique/procenvinjection-remote-code-injection-by-abusing-process-environment-strings/"
        },
        {
            "id": 358,
            "name": "Process Argument Spoofing",
            "url": "https://unprotect.it/technique/process-argument-spoofing/"
        }
    ]
}