Documentation / User Guides

  ☕ 1 min read

By Diego Parrilla 

User Guides

These guides explain how to use Threat Jammer and sleash its potential.

  1. What is Threat Jammer?

This guide explains what is Threat Jammer and how to unleash its potential.

  1. How Threat Jammer works

A high level overview of the different services and how they work together.

  1. Threat Jammer API keys

To use Threat Jammer API keys, you need to create them first. Learn how to do it and its caracteristics.

  1. Introduction to the Threat Jammer User API

How to use the User API to interact with Threat Jammer.

  1. Introduction to the Threat Jammer Report API

How to use the Report API to let devices interact with Threat Jammer.

  1. Threat Jammer site

The Threat Jammer website is a web application that allows you to interact with Threat Jammer User API.

  1. Annex: List of handled API errors

Found a typo? Other suggestions?

Edit this page on GitHub

Version:0.0.2

Published on 2022-01-12

Modified on 2022-01-12

Signup to start using Threat Jammer for free!