You can use the Intruder API to manage your targets, kick off scans and get your results - why not integrate Intruder into your development pipeline for maximum peace of mind?
Everything you need to know can be found in our Developer Hub.
Our API is organised around REST. It has predictable resource-oriented URLs, accepts form-encoded request bodies, returns JSON-encoded responses, and uses standard HTTP response codes, authentication, and verbs.
The Intruder RESTful API Reference provides a detailed list of all API endpoints and their descriptions. All calls to the API are validated against an API token. Check this page to learn how to create an access token for your account.
Our API is rate limited on a per user basis. If the API receives too many requests for a single access token, the API will start rejecting requests. See more details here.
To get started with our API, your first stage will be to generate an API Access Token for your Intruder account. Check out this page to learn how to create an access token for your account.