ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "litepub": "http://litepub.social/ns#", "directMessage": "litepub:directMessage", "Hashtag": "as:Hashtag" } ], "id": "https://infosec.exchange/users/kpwn/statuses/110446195657516997", "type": "Note", "summary": null, "inReplyTo": null, "published": "2023-05-28T12:00:02Z", "url": "https://infosec.exchange/@kpwn/110446195657516997", "attributedTo": "https://infosec.exchange/users/kpwn", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/kpwn/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/kpwn/statuses/110446195657516997", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2023-05-28:objectId=67601272:objectType=Conversation", "content": "<p>🚨 JavaScript Pentesting 101: A Complete Guide to Analyzing Web Applications 🚨</p><p>I dedicated April and May to pentesting <a href=\"https://infosec.exchange/tags/JavaScript\" class=\"mention hashtag\" rel=\"tag\">#<span>JavaScript</span></a>.</p><p>The result is my longest thread series ever.</p><p>To help you keep track, here is an overview of all the topics covered:</p><p>1. Static Analysis 🔍<br /><a href=\"https://infosec.exchange/@kpwn/110242352466343321\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1102423</span><span class=\"invisible\">52466343321</span></a></p><p>2. Dynamic Analysis 📑<br /><a href=\"https://infosec.exchange/@kpwn/110287650959218515\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1102876</span><span class=\"invisible\">50959218515</span></a></p><p>3. Obfuscation &amp; Deobfuscation 🥸<br /><a href=\"https://infosec.exchange/@kpwn/110321624840524023\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1103216</span><span class=\"invisible\">24840524023</span></a></p><p>4. Hands-On: Analyze Obfuscated Code ✍<br /><a href=\"https://infosec.exchange/@kpwn/110361260966659611\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1103612</span><span class=\"invisible\">60966659611</span></a></p><p>5. Local Overrides 📝<br /><a href=\"https://infosec.exchange/@kpwn/110400897211108426\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1104008</span><span class=\"invisible\">97211108426</span></a></p><p>6. Bypass Code Protection 🥷<br /><a href=\"https://infosec.exchange/@kpwn/110440533357021730\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1104405</span><span class=\"invisible\">33357021730</span></a></p><p>Here&#39;s everything compiled into a blog post 📰<br /><a href=\"https://kpwn.de/2023/05/javascript-analysis-for-pentesters/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">kpwn.de/2023/05/javascript-ana</span><span class=\"invisible\">lysis-for-pentesters/</span></a></p><p>Do you find my content valuable?</p><p>🔔 Follow me for more web security content!</p><p>🔁 Also, boost this toot to help others!</p><p><a href=\"https://infosec.exchange/tags/Infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>Infosec</span></a> <a href=\"https://infosec.exchange/tags/CyberSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberSecurity</span></a> <a href=\"https://infosec.exchange/tags/BugBounty\" class=\"mention hashtag\" rel=\"tag\">#<span>BugBounty</span></a> <a href=\"https://infosec.exchange/tags/Pentesting\" class=\"mention hashtag\" rel=\"tag\">#<span>Pentesting</span></a></p>", "contentMap": { "en": "<p>🚨 JavaScript Pentesting 101: A Complete Guide to Analyzing Web Applications 🚨</p><p>I dedicated April and May to pentesting <a href=\"https://infosec.exchange/tags/JavaScript\" class=\"mention hashtag\" rel=\"tag\">#<span>JavaScript</span></a>.</p><p>The result is my longest thread series ever.</p><p>To help you keep track, here is an overview of all the topics covered:</p><p>1. Static Analysis 🔍<br /><a href=\"https://infosec.exchange/@kpwn/110242352466343321\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1102423</span><span class=\"invisible\">52466343321</span></a></p><p>2. Dynamic Analysis 📑<br /><a href=\"https://infosec.exchange/@kpwn/110287650959218515\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1102876</span><span class=\"invisible\">50959218515</span></a></p><p>3. Obfuscation &amp; Deobfuscation 🥸<br /><a href=\"https://infosec.exchange/@kpwn/110321624840524023\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1103216</span><span class=\"invisible\">24840524023</span></a></p><p>4. Hands-On: Analyze Obfuscated Code ✍<br /><a href=\"https://infosec.exchange/@kpwn/110361260966659611\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1103612</span><span class=\"invisible\">60966659611</span></a></p><p>5. Local Overrides 📝<br /><a href=\"https://infosec.exchange/@kpwn/110400897211108426\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1104008</span><span class=\"invisible\">97211108426</span></a></p><p>6. Bypass Code Protection 🥷<br /><a href=\"https://infosec.exchange/@kpwn/110440533357021730\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1104405</span><span class=\"invisible\">33357021730</span></a></p><p>Here&#39;s everything compiled into a blog post 📰<br /><a href=\"https://kpwn.de/2023/05/javascript-analysis-for-pentesters/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">kpwn.de/2023/05/javascript-ana</span><span class=\"invisible\">lysis-for-pentesters/</span></a></p><p>Do you find my content valuable?</p><p>🔔 Follow me for more web security content!</p><p>🔁 Also, boost this toot to help others!</p><p><a href=\"https://infosec.exchange/tags/Infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>Infosec</span></a> <a href=\"https://infosec.exchange/tags/CyberSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberSecurity</span></a> <a href=\"https://infosec.exchange/tags/BugBounty\" class=\"mention hashtag\" rel=\"tag\">#<span>BugBounty</span></a> <a href=\"https://infosec.exchange/tags/Pentesting\" class=\"mention hashtag\" rel=\"tag\">#<span>Pentesting</span></a></p>" }, "attachment": [], "tag": [ { "type": "Hashtag", "href": "https://infosec.exchange/tags/javascript", "name": "#javascript" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/infosec", "name": "#infosec" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/bugbounty", "name": "#bugbounty" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/pentesting", "name": "#pentesting" } ], "replies": { "id": "https://infosec.exchange/users/kpwn/statuses/110446195657516997/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/kpwn/statuses/110446195657516997/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/kpwn/statuses/110446195657516997/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/kpwn/statuses/110446195657516997/likes", "type": "Collection", "totalItems": 32 }, "shares": { "id": "https://infosec.exchange/users/kpwn/statuses/110446195657516997/shares", "type": "Collection", "totalItems": 15 } }