A intermediary software that transparently intercepts all API calls and changes arguments passed. Can be used for:

  • Malicious purposes
  • Repurposing legacy APIs

Example