A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"blurhash": "toot:blurhash",
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
},
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/WafflesExploits/statuses/114013096235444651",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2025-02-16T10:29:45Z",
"url": "https://infosec.exchange/@WafflesExploits/114013096235444651",
"attributedTo": "https://infosec.exchange/users/WafflesExploits",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/WafflesExploits/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/WafflesExploits/statuses/114013096235444651",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2025-02-16:objectId=242107651:objectType=Conversation",
"content": "<p>Hiding Shellcode in Image Files with Python and C/C++ -> Now Even Stealthier Without WinAPIs</p><p>Check it out here:<br />🔗 GitHub Repository:<br />👉 <a href=\"https://github.com/WafflesExploits/hide-payload-in-images\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/WafflesExploits/hid</span><span class=\"invisible\">e-payload-in-images</span></a><br />🔗 Full Guide Explaining the Code:<br />👉 <a href=\"https://wafflesexploits.github.io/posts/Hide_a_Payload_in_Plain_Sight_Embedding_Shellcode_in_a_Image_file/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">wafflesexploits.github.io/post</span><span class=\"invisible\">s/Hide_a_Payload_in_Plain_Sight_Embedding_Shellcode_in_a_Image_file/</span></a></p><p>Happy hacking! 😀</p><p><a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/MalwareDevelopment\" class=\"mention hashtag\" rel=\"tag\">#<span>MalwareDevelopment</span></a> <a href=\"https://infosec.exchange/tags/Steganography\" class=\"mention hashtag\" rel=\"tag\">#<span>Steganography</span></a> <a href=\"https://infosec.exchange/tags/RedTeam\" class=\"mention hashtag\" rel=\"tag\">#<span>RedTeam</span></a> <br /><a href=\"https://infosec.exchange/tags/EDREvasion\" class=\"mention hashtag\" rel=\"tag\">#<span>EDREvasion</span></a> <a href=\"https://infosec.exchange/tags/Python\" class=\"mention hashtag\" rel=\"tag\">#<span>Python</span></a> <a href=\"https://infosec.exchange/tags/C\" class=\"mention hashtag\" rel=\"tag\">#<span>C</span></a> <a href=\"https://infosec.exchange/tags/Hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>Hacking</span></a> <a href=\"https://infosec.exchange/tags/PayloadHiding\" class=\"mention hashtag\" rel=\"tag\">#<span>PayloadHiding</span></a> <a href=\"https://infosec.exchange/tags/PenetrationTesting\" class=\"mention hashtag\" rel=\"tag\">#<span>PenetrationTesting</span></a></p>",
"contentMap": {
"en": "<p>Hiding Shellcode in Image Files with Python and C/C++ -> Now Even Stealthier Without WinAPIs</p><p>Check it out here:<br />🔗 GitHub Repository:<br />👉 <a href=\"https://github.com/WafflesExploits/hide-payload-in-images\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/WafflesExploits/hid</span><span class=\"invisible\">e-payload-in-images</span></a><br />🔗 Full Guide Explaining the Code:<br />👉 <a href=\"https://wafflesexploits.github.io/posts/Hide_a_Payload_in_Plain_Sight_Embedding_Shellcode_in_a_Image_file/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">wafflesexploits.github.io/post</span><span class=\"invisible\">s/Hide_a_Payload_in_Plain_Sight_Embedding_Shellcode_in_a_Image_file/</span></a></p><p>Happy hacking! 😀</p><p><a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/MalwareDevelopment\" class=\"mention hashtag\" rel=\"tag\">#<span>MalwareDevelopment</span></a> <a href=\"https://infosec.exchange/tags/Steganography\" class=\"mention hashtag\" rel=\"tag\">#<span>Steganography</span></a> <a href=\"https://infosec.exchange/tags/RedTeam\" class=\"mention hashtag\" rel=\"tag\">#<span>RedTeam</span></a> <br /><a href=\"https://infosec.exchange/tags/EDREvasion\" class=\"mention hashtag\" rel=\"tag\">#<span>EDREvasion</span></a> <a href=\"https://infosec.exchange/tags/Python\" class=\"mention hashtag\" rel=\"tag\">#<span>Python</span></a> <a href=\"https://infosec.exchange/tags/C\" class=\"mention hashtag\" rel=\"tag\">#<span>C</span></a> <a href=\"https://infosec.exchange/tags/Hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>Hacking</span></a> <a href=\"https://infosec.exchange/tags/PayloadHiding\" class=\"mention hashtag\" rel=\"tag\">#<span>PayloadHiding</span></a> <a href=\"https://infosec.exchange/tags/PenetrationTesting\" class=\"mention hashtag\" rel=\"tag\">#<span>PenetrationTesting</span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "video/mp4",
"url": "https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/013/093/804/709/679/original/5700a58817c488de.mp4",
"name": "Demo showcasing project",
"blurhash": "U14V5l-=x^WZ?c%OxwbJ%Nxvxvj^n%jcxuog",
"focalPoint": [
0,
0
],
"width": 2556,
"height": 1202
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/malwaredevelopment",
"name": "#malwaredevelopment"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/steganography",
"name": "#steganography"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/redteam",
"name": "#redteam"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/edrevasion",
"name": "#edrevasion"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/python",
"name": "#python"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/c",
"name": "#c"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/payloadhiding",
"name": "#payloadhiding"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/penetrationtesting",
"name": "#penetrationtesting"
}
],
"replies": {
"id": "https://infosec.exchange/users/WafflesExploits/statuses/114013096235444651/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/WafflesExploits/statuses/114013096235444651/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/WafflesExploits/statuses/114013096235444651/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/WafflesExploits/statuses/114013096235444651/likes",
"type": "Collection",
"totalItems": 2
},
"shares": {
"id": "https://infosec.exchange/users/WafflesExploits/statuses/114013096235444651/shares",
"type": "Collection",
"totalItems": 1
}
}