GET /api/featured_api/4/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "https://unprotect.it/api/featured_api/4/?format=api",
    "library": {
        "id": 1,
        "name": "Kernel32.dll",
        "description": ""
    },
    "name": "VirtualAllocEx",
    "ref_link": "https://learn.microsoft.com/en-us/windows/win32/api/memoryapi/nf-memoryapi-virtualallocex?WT.mc_id=SEC-MVP-5005282",
    "from_msdn": true,
    "caution_level": "high",
    "description": "",
    "featured_in": [
        {
            "id": 88,
            "name": "Process Hollowing, RunPE",
            "url": "https://unprotect.it/technique/process-hollowing-runpe/"
        },
        {
            "id": 93,
            "name": "DLL Injection via CreateRemoteThread and LoadLibrary",
            "url": "https://unprotect.it/technique/dll-injection-via-createremotethread-and-loadlibrary/"
        },
        {
            "id": 113,
            "name": "APC injection",
            "url": "https://unprotect.it/technique/apc-injection/"
        },
        {
            "id": 115,
            "name": "Extra Window Memory Injection",
            "url": "https://unprotect.it/technique/extra-window-memory-injection/"
        },
        {
            "id": 118,
            "name": "PE Injection",
            "url": "https://unprotect.it/technique/pe-injection/"
        },
        {
            "id": 153,
            "name": "ConsoleWindowClass",
            "url": "https://unprotect.it/technique/consolewindowclass/"
        },
        {
            "id": 154,
            "name": "Treepoline",
            "url": "https://unprotect.it/technique/treepoline/"
        },
        {
            "id": 155,
            "name": "Listplanting",
            "url": "https://unprotect.it/technique/listplanting/"
        },
        {
            "id": 156,
            "name": "OLEUM",
            "url": "https://unprotect.it/technique/oleum/"
        },
        {
            "id": 157,
            "name": "EditWordBreakProc",
            "url": "https://unprotect.it/technique/editwordbreakproc/"
        },
        {
            "id": 158,
            "name": "WordWarping",
            "url": "https://unprotect.it/technique/wordwarping/"
        },
        {
            "id": 160,
            "name": "CLIPBRDWNDCLASS",
            "url": "https://unprotect.it/technique/clipbrdwndclass/"
        },
        {
            "id": 161,
            "name": "DNS API Injection",
            "url": "https://unprotect.it/technique/dns-api-injection/"
        },
        {
            "id": 162,
            "name": "Breaking BaDDEr",
            "url": "https://unprotect.it/technique/breaking-badder/"
        },
        {
            "id": 167,
            "name": "File Melt",
            "url": "https://unprotect.it/technique/file-melt/"
        },
        {
            "id": 173,
            "name": "Access Token Manipulation: Parent PID Spoofing",
            "url": "https://unprotect.it/technique/access-token-manipulation-parent-pid-spoofing/"
        },
        {
            "id": 208,
            "name": "NLS Code Injection Through Registry",
            "url": "https://unprotect.it/technique/nls-code-injection-through-registry/"
        },
        {
            "id": 223,
            "name": "Dirty Vanity",
            "url": "https://unprotect.it/technique/dirty-vanity/"
        },
        {
            "id": 359,
            "name": "FuncIn",
            "url": "https://unprotect.it/technique/funcin/"
        }
    ]
}