Selki Knowledge Base
  • English
  • Spanish
  • Portuguese (BR)
Go to website
Back
Articles on:Integrations
Help on how to use our API's and webhooks

Categories

  • General
  • Selki Dashboard
  • Threats
  • Vulnerabilities
  • Watchers
  • Simulated Phishing Campaigns
  • Reporting
  • Integrations
API Key
  • Obtaining Your API Key
    Integrations & API Access in Selki Selki enables seamless integration with your internal tools, dashboards, and workflows through a powerful GraphQL API. This allows you to programmatically pull threat intelligence, phishing simulation data, and other insights directly from Selki’s platform into your own systems, SIEMs, SOARs or TIPs. What Can You Do with the API? Using Selki’s API, you can: Query threat data (e.g., credentials found, URLs, usernames, passwords) Export results fromFew readers
API Docs
  • API Docs & Explorer
    Selki API Explorer & Docs – Full Guide for All Users Selki’s API Explorer is a powerful feature that allows you to interact with the platform's data programmatically using GraphQL — a flexible query language ideal for cybersecurity use cases. But don’t worry — you don’t need to be a developer to use it effectively. This article will walk you through what the API Explorer is, how it works, and how to run useful queries to unlock insights directly from your Selki data. What Is the API EFew readers
Webhooks
  • Selki Webhooks
    Selki Developer Portal: Using API Docs & Webhooks Selki provides powerful webhooks so you can be notified the instant an event happens or an alert is created. But what is a webhook?? Imagine a doorbell on your house. When someone pushes it, you get notified — instantly. You didn’t need to keep checking the door yourself every 2 miniutes. The doorbell told you! Webhooks work the same way: When something happens in Selki (like a phishing email is clicked), your system gets notifiedSome readers

Not finding what you are looking for?

Chat with us or send us an email.

  • Chat with us
  • Send us an email
© 2025Selki Knowledge BaseWe run on Crisp Knowledge.