ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "litepub": "http://litepub.social/ns#", "directMessage": "litepub:directMessage", "blurhash": "toot:blurhash", "focalPoint": { "@container": "@list", "@id": "toot:focalPoint" } } ], "id": "https://infosec.exchange/users/UlfFrisk/statuses/109352276823410381", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-16T07:22:05Z", "url": "https://infosec.exchange/@UlfFrisk/109352276823410381", "attributedTo": "https://infosec.exchange/users/UlfFrisk", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/UlfFrisk/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/UlfFrisk/statuses/109352276823410381", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2022-11-16:objectId=21807817:objectType=Conversation", "content": "<p>MemProcFS v5.2 now supports analysis of Virtual Machines 😀<br />MemProcFS - super easy memory analysis and forensics in a virtual file system!<br /><a href=\"https://github.com/ufrisk/MemProcFS\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">github.com/ufrisk/MemProcFS</span><span class=\"invisible\"></span></a></p><p>Been working on this for a while. An important memory forensics feature for the future as Windows focus more on virtualization (WSL2 etc). VMs show up as child MemProcFS&#39;es under /vm. You&#39;d need to enable with -vm startup option. Works great on both live memory and memory dump files!</p><p>More info at: <a href=\"https://github.com/ufrisk/MemProcFS/wiki/VM\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/ufrisk/MemProcFS/wi</span><span class=\"invisible\">ki/VM</span></a></p><p>Also huge thanks to gerhart_x for the awesome Hyper-V research at <a href=\"https://hvinternals.blogspot.com/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">hvinternals.blogspot.com/</span><span class=\"invisible\"></span></a> making this possible!</p>", "contentMap": { "en": "<p>MemProcFS v5.2 now supports analysis of Virtual Machines 😀<br />MemProcFS - super easy memory analysis and forensics in a virtual file system!<br /><a href=\"https://github.com/ufrisk/MemProcFS\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">github.com/ufrisk/MemProcFS</span><span class=\"invisible\"></span></a></p><p>Been working on this for a while. An important memory forensics feature for the future as Windows focus more on virtualization (WSL2 etc). VMs show up as child MemProcFS&#39;es under /vm. You&#39;d need to enable with -vm startup option. Works great on both live memory and memory dump files!</p><p>More info at: <a href=\"https://github.com/ufrisk/MemProcFS/wiki/VM\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/ufrisk/MemProcFS/wi</span><span class=\"invisible\">ki/VM</span></a></p><p>Also huge thanks to gerhart_x for the awesome Hyper-V research at <a href=\"https://hvinternals.blogspot.com/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">hvinternals.blogspot.com/</span><span class=\"invisible\"></span></a> making this possible!</p>" }, "attachment": [ { "type": "Document", "mediaType": "image/png", "url": "https://media.infosec.exchange/infosec.exchange/media_attachments/files/109/352/274/733/558/885/original/929c2de10ce3d33f.png", "name": null, "blurhash": "UhP6~y4Tog%M009FflxuM|oJbHf6%M-:a#Rj", "width": 1433, "height": 1069 } ], "tag": [], "replies": { "id": "https://infosec.exchange/users/UlfFrisk/statuses/109352276823410381/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/UlfFrisk/statuses/109352276823410381/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/UlfFrisk/statuses/109352276823410381/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/UlfFrisk/statuses/109352276823410381/likes", "type": "Collection", "totalItems": 28 }, "shares": { "id": "https://infosec.exchange/users/UlfFrisk/statuses/109352276823410381/shares", "type": "Collection", "totalItems": 22 } }