HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"url": "https://unprotect.it/api/featured_api/425/?format=api",
"library": {
"id": 1,
"name": "Kernel32.dll",
"description": ""
},
"name": "GetProcAddress",
"ref_link": null,
"from_msdn": true,
"caution_level": "medium",
"description": "",
"featured_in": [
{
"id": 55,
"name": "NtSetInformationThread",
"url": "https://unprotect.it/technique/ntsetinformationthread/"
},
{
"id": 56,
"name": "NtQueryObject",
"url": "https://unprotect.it/technique/ntqueryobject/"
},
{
"id": 59,
"name": "CsrGetProcessID",
"url": "https://unprotect.it/technique/csrgetprocessid/"
},
{
"id": 61,
"name": "IsDebugged Flag",
"url": "https://unprotect.it/technique/isdebugged-flag/"
},
{
"id": 63,
"name": "NtGlobalFlag",
"url": "https://unprotect.it/technique/ntglobalflag/"
},
{
"id": 75,
"name": "API Obfuscation",
"url": "https://unprotect.it/technique/api-obfuscation/"
},
{
"id": 93,
"name": "DLL Injection via CreateRemoteThread and LoadLibrary",
"url": "https://unprotect.it/technique/dll-injection-via-createremotethread-and-loadlibrary/"
},
{
"id": 107,
"name": "NtSetDebugFilterState",
"url": "https://unprotect.it/technique/ntsetdebugfilterstate/"
},
{
"id": 110,
"name": "Reflective DLL injection",
"url": "https://unprotect.it/technique/reflective-dll-injection/"
},
{
"id": 114,
"name": "Atom Bombing",
"url": "https://unprotect.it/technique/atom-bombing/"
},
{
"id": 115,
"name": "Extra Window Memory Injection",
"url": "https://unprotect.it/technique/extra-window-memory-injection/"
},
{
"id": 116,
"name": "Injection using Shims",
"url": "https://unprotect.it/technique/injection-using-shims/"
},
{
"id": 124,
"name": "Inline Hooking",
"url": "https://unprotect.it/technique/inline-hooking/"
},
{
"id": 131,
"name": "Kill Process",
"url": "https://unprotect.it/technique/kill-process/"
},
{
"id": 136,
"name": "NTFS Files Attributes",
"url": "https://unprotect.it/technique/ntfs-files-attributes/"
},
{
"id": 165,
"name": "Indicator Removal: Timestomp",
"url": "https://unprotect.it/technique/indicator-removal-timestomp/"
},
{
"id": 167,
"name": "File Melt",
"url": "https://unprotect.it/technique/file-melt/"
},
{
"id": 168,
"name": "Detecting Online Sandbox",
"url": "https://unprotect.it/technique/detecting-online-sandbox/"
},
{
"id": 172,
"name": "Killing Windows Event Log",
"url": "https://unprotect.it/technique/killing-windows-event-log/"
},
{
"id": 177,
"name": "Disabling Event Tracing for Windows (ETW)",
"url": "https://unprotect.it/technique/disabling-event-tracing-for-windows-etw/"
},
{
"id": 178,
"name": "ProcEnvInjection - Remote code injection by abusing process environment strings",
"url": "https://unprotect.it/technique/procenvinjection-remote-code-injection-by-abusing-process-environment-strings/"
},
{
"id": 180,
"name": "Thwarting Stack-Frame Analysis",
"url": "https://unprotect.it/technique/thwarting-stack-frame-analysis/"
},
{
"id": 182,
"name": "Unloading Sysmon Driver",
"url": "https://unprotect.it/technique/unloading-sysmon-driver/"
},
{
"id": 221,
"name": "Tamper DLL Export Names & GetProcAddress Spoofing",
"url": "https://unprotect.it/technique/tamper-dll-export-names-getprocaddress-spoofing/"
},
{
"id": 223,
"name": "Dirty Vanity",
"url": "https://unprotect.it/technique/dirty-vanity/"
}
]
}