GET /api/techniques/106/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 106,
    "key": "code-cave",
    "unprotect_id": "U0502",
    "name": "Code Cave",
    "description": "A code cave is a series of null bytes in a process's memory. The code cave inside a process's memory is often a reference to a section of the code’s script functions that have capacity for the injection of custom instructions. For example, if a script’s memory allows for 5 bytes and only 3 bytes are used, then the remaining 2 bytes can be used to add external code to the script.",
    "resources": "https://resources.infosecinstitute.com/injecting-spyware-exe-code-injections/",
    "creation_date": "2019-03-23T16:53:39Z",
    "tags": "",
    "modification_date": "2023-10-04T10:42:32.184000Z",
    "category": [
        2
    ],
    "rules": [],
    "attachments": [],
    "featured_api": [],
    "contributors": [
        1,
        2
    ]
}