A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/kpwn/statuses/110446195657516997",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2023-05-28T12:00:02Z",
"url": "https://infosec.exchange/@kpwn/110446195657516997",
"attributedTo": "https://infosec.exchange/users/kpwn",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/kpwn/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/kpwn/statuses/110446195657516997",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2023-05-28:objectId=67601272:objectType=Conversation",
"content": "<p>🚨 JavaScript Pentesting 101: A Complete Guide to Analyzing Web Applications 🚨</p><p>I dedicated April and May to pentesting <a href=\"https://infosec.exchange/tags/JavaScript\" class=\"mention hashtag\" rel=\"tag\">#<span>JavaScript</span></a>.</p><p>The result is my longest thread series ever.</p><p>To help you keep track, here is an overview of all the topics covered:</p><p>1. Static Analysis 🔍<br /><a href=\"https://infosec.exchange/@kpwn/110242352466343321\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1102423</span><span class=\"invisible\">52466343321</span></a></p><p>2. Dynamic Analysis 📑<br /><a href=\"https://infosec.exchange/@kpwn/110287650959218515\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1102876</span><span class=\"invisible\">50959218515</span></a></p><p>3. Obfuscation & Deobfuscation 🥸<br /><a href=\"https://infosec.exchange/@kpwn/110321624840524023\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1103216</span><span class=\"invisible\">24840524023</span></a></p><p>4. Hands-On: Analyze Obfuscated Code ✍<br /><a href=\"https://infosec.exchange/@kpwn/110361260966659611\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1103612</span><span class=\"invisible\">60966659611</span></a></p><p>5. Local Overrides 📝<br /><a href=\"https://infosec.exchange/@kpwn/110400897211108426\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1104008</span><span class=\"invisible\">97211108426</span></a></p><p>6. Bypass Code Protection 🥷<br /><a href=\"https://infosec.exchange/@kpwn/110440533357021730\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1104405</span><span class=\"invisible\">33357021730</span></a></p><p>Here's everything compiled into a blog post 📰<br /><a href=\"https://kpwn.de/2023/05/javascript-analysis-for-pentesters/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">kpwn.de/2023/05/javascript-ana</span><span class=\"invisible\">lysis-for-pentesters/</span></a></p><p>Do you find my content valuable?</p><p>🔔 Follow me for more web security content!</p><p>🔁 Also, boost this toot to help others!</p><p><a href=\"https://infosec.exchange/tags/Infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>Infosec</span></a> <a href=\"https://infosec.exchange/tags/CyberSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberSecurity</span></a> <a href=\"https://infosec.exchange/tags/BugBounty\" class=\"mention hashtag\" rel=\"tag\">#<span>BugBounty</span></a> <a href=\"https://infosec.exchange/tags/Pentesting\" class=\"mention hashtag\" rel=\"tag\">#<span>Pentesting</span></a></p>",
"contentMap": {
"en": "<p>🚨 JavaScript Pentesting 101: A Complete Guide to Analyzing Web Applications 🚨</p><p>I dedicated April and May to pentesting <a href=\"https://infosec.exchange/tags/JavaScript\" class=\"mention hashtag\" rel=\"tag\">#<span>JavaScript</span></a>.</p><p>The result is my longest thread series ever.</p><p>To help you keep track, here is an overview of all the topics covered:</p><p>1. Static Analysis 🔍<br /><a href=\"https://infosec.exchange/@kpwn/110242352466343321\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1102423</span><span class=\"invisible\">52466343321</span></a></p><p>2. Dynamic Analysis 📑<br /><a href=\"https://infosec.exchange/@kpwn/110287650959218515\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1102876</span><span class=\"invisible\">50959218515</span></a></p><p>3. Obfuscation & Deobfuscation 🥸<br /><a href=\"https://infosec.exchange/@kpwn/110321624840524023\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1103216</span><span class=\"invisible\">24840524023</span></a></p><p>4. Hands-On: Analyze Obfuscated Code ✍<br /><a href=\"https://infosec.exchange/@kpwn/110361260966659611\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1103612</span><span class=\"invisible\">60966659611</span></a></p><p>5. Local Overrides 📝<br /><a href=\"https://infosec.exchange/@kpwn/110400897211108426\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1104008</span><span class=\"invisible\">97211108426</span></a></p><p>6. Bypass Code Protection 🥷<br /><a href=\"https://infosec.exchange/@kpwn/110440533357021730\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@kpwn/1104405</span><span class=\"invisible\">33357021730</span></a></p><p>Here's everything compiled into a blog post 📰<br /><a href=\"https://kpwn.de/2023/05/javascript-analysis-for-pentesters/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">kpwn.de/2023/05/javascript-ana</span><span class=\"invisible\">lysis-for-pentesters/</span></a></p><p>Do you find my content valuable?</p><p>🔔 Follow me for more web security content!</p><p>🔁 Also, boost this toot to help others!</p><p><a href=\"https://infosec.exchange/tags/Infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>Infosec</span></a> <a href=\"https://infosec.exchange/tags/CyberSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberSecurity</span></a> <a href=\"https://infosec.exchange/tags/BugBounty\" class=\"mention hashtag\" rel=\"tag\">#<span>BugBounty</span></a> <a href=\"https://infosec.exchange/tags/Pentesting\" class=\"mention hashtag\" rel=\"tag\">#<span>Pentesting</span></a></p>"
},
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/javascript",
"name": "#javascript"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/infosec",
"name": "#infosec"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/bugbounty",
"name": "#bugbounty"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/pentesting",
"name": "#pentesting"
}
],
"replies": {
"id": "https://infosec.exchange/users/kpwn/statuses/110446195657516997/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/kpwn/statuses/110446195657516997/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/kpwn/statuses/110446195657516997/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/kpwn/statuses/110446195657516997/likes",
"type": "Collection",
"totalItems": 32
},
"shares": {
"id": "https://infosec.exchange/users/kpwn/statuses/110446195657516997/shares",
"type": "Collection",
"totalItems": 15
}
}