A intermediary software that transparently intercepts all API calls and changes arguments passed. Can be used for:
- Malicious purposes
- Repurposing legacy APIs
A intermediary software that transparently intercepts all API calls and changes arguments passed. Can be used for: