GET /api/featured_api/425/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "https://unprotect.it/api/featured_api/425/?format=api",
    "library": {
        "id": 1,
        "name": "Kernel32.dll",
        "description": ""
    },
    "name": "GetProcAddress",
    "ref_link": null,
    "from_msdn": true,
    "caution_level": "medium",
    "description": "",
    "featured_in": [
        {
            "id": 55,
            "name": "NtSetInformationThread",
            "url": "https://unprotect.it/technique/ntsetinformationthread/"
        },
        {
            "id": 56,
            "name": "NtQueryObject",
            "url": "https://unprotect.it/technique/ntqueryobject/"
        },
        {
            "id": 59,
            "name": "CsrGetProcessID",
            "url": "https://unprotect.it/technique/csrgetprocessid/"
        },
        {
            "id": 61,
            "name": "IsDebugged Flag",
            "url": "https://unprotect.it/technique/isdebugged-flag/"
        },
        {
            "id": 63,
            "name": "NtGlobalFlag",
            "url": "https://unprotect.it/technique/ntglobalflag/"
        },
        {
            "id": 75,
            "name": "API Obfuscation",
            "url": "https://unprotect.it/technique/api-obfuscation/"
        },
        {
            "id": 93,
            "name": "DLL Injection via CreateRemoteThread and LoadLibrary",
            "url": "https://unprotect.it/technique/dll-injection-via-createremotethread-and-loadlibrary/"
        },
        {
            "id": 107,
            "name": "NtSetDebugFilterState",
            "url": "https://unprotect.it/technique/ntsetdebugfilterstate/"
        },
        {
            "id": 110,
            "name": "Reflective DLL injection",
            "url": "https://unprotect.it/technique/reflective-dll-injection/"
        },
        {
            "id": 114,
            "name": "Atom Bombing",
            "url": "https://unprotect.it/technique/atom-bombing/"
        },
        {
            "id": 115,
            "name": "Extra Window Memory Injection",
            "url": "https://unprotect.it/technique/extra-window-memory-injection/"
        },
        {
            "id": 116,
            "name": "Injection using Shims",
            "url": "https://unprotect.it/technique/injection-using-shims/"
        },
        {
            "id": 124,
            "name": "Inline Hooking",
            "url": "https://unprotect.it/technique/inline-hooking/"
        },
        {
            "id": 131,
            "name": "Kill Process",
            "url": "https://unprotect.it/technique/kill-process/"
        },
        {
            "id": 136,
            "name": "NTFS Files Attributes",
            "url": "https://unprotect.it/technique/ntfs-files-attributes/"
        },
        {
            "id": 165,
            "name": "Indicator Removal: Timestomp",
            "url": "https://unprotect.it/technique/indicator-removal-timestomp/"
        },
        {
            "id": 167,
            "name": "File Melt",
            "url": "https://unprotect.it/technique/file-melt/"
        },
        {
            "id": 168,
            "name": "Detecting Online Sandbox",
            "url": "https://unprotect.it/technique/detecting-online-sandbox/"
        },
        {
            "id": 172,
            "name": "Killing Windows Event Log",
            "url": "https://unprotect.it/technique/killing-windows-event-log/"
        },
        {
            "id": 177,
            "name": "Disabling Event Tracing for Windows (ETW)",
            "url": "https://unprotect.it/technique/disabling-event-tracing-for-windows-etw/"
        },
        {
            "id": 178,
            "name": "ProcEnvInjection - Remote code injection by abusing process environment strings",
            "url": "https://unprotect.it/technique/procenvinjection-remote-code-injection-by-abusing-process-environment-strings/"
        },
        {
            "id": 180,
            "name": "Thwarting Stack-Frame Analysis",
            "url": "https://unprotect.it/technique/thwarting-stack-frame-analysis/"
        },
        {
            "id": 182,
            "name": "Unloading Sysmon Driver",
            "url": "https://unprotect.it/technique/unloading-sysmon-driver/"
        },
        {
            "id": 221,
            "name": "Tamper DLL Export Names & GetProcAddress Spoofing",
            "url": "https://unprotect.it/technique/tamper-dll-export-names-getprocaddress-spoofing/"
        },
        {
            "id": 223,
            "name": "Dirty Vanity",
            "url": "https://unprotect.it/technique/dirty-vanity/"
        }
    ]
}