This section provides an introduction to the Phishy API, explaining how to integrate the API into existing IT infrastructures seamlessly.
Welcome
The Phishy API is developed to integrate seamlessly into the existing IT
infrastructures of organizations. It offers developers the flexibility to manage the
modules through their user interfaces, providing an extensible and flexible solution.
This documentation contains essential information on how to use the API, technical details,
and integration suggestions, allowing users to make the most of Phishy’s cybersecurity solutions.
API Base URL
All requests should be directed to the following address: