A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"blurhash": "toot:blurhash",
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
},
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/alevsk/statuses/114383156983005500",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2025-04-22T19:01:04Z",
"url": "https://infosec.exchange/@alevsk/114383156983005500",
"attributedTo": "https://infosec.exchange/users/alevsk",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/alevsk/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/alevsk/statuses/114383156983005500",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2025-04-22:objectId=264092749:objectType=Conversation",
"content": "<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>"Threat-Informed Defense" isn't just a buzzword. The Center for Threat-Informed Defense bridges MITRE ATT&CK with actionable tools like Adversary Emulation Plans and the Attack Workbench, empowering defenders to stay ahead of real-world TTPs. <a href=\"https://infosec.exchange/tags/CyberDefense\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberDefense</span></a> <a href=\"https://infosec.exchange/tags/MITREATTACK\" class=\"mention hashtag\" rel=\"tag\">#<span>MITREATTACK</span></a> </p><p>Want to map security controls to adversary behavior? Check out Mappings Explorer by the Center for Threat-Informed Defense. It aligns your defense strategy directly with the MITRE ATT&CK framework. Precision matters. <a href=\"https://infosec.exchange/tags/ThreatIntelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatIntelligence</span></a> <a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> </p><p>Attack Flow helps you visualize how attackers chain techniques into full-scale operations. An indispensable tool for understanding and mitigating attack sequences. Powered by the Center for Threat-Informed Defense. <a href=\"https://infosec.exchange/tags/SOCtools\" class=\"mention hashtag\" rel=\"tag\">#<span>SOCtools</span></a> <a href=\"https://infosec.exchange/tags/ThreatModeling\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatModeling</span></a> </p><p>TRAM leverages automation to map CTI reports directly to MITRE ATT&CK tactics and techniques. Less manual work, more actionable insights. Open-source ingenuity at its best. <a href=\"https://infosec.exchange/tags/CyberThreats\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberThreats</span></a> <a href=\"https://infosec.exchange/tags/MITREATTACK\" class=\"mention hashtag\" rel=\"tag\">#<span>MITREATTACK</span></a> </p><p>Building effective cyber analytics requires depth; "Summiting the Pyramid" delivers frameworks to challenge adversary evasion strategies. A research-backed way to harden defenses. <a href=\"https://infosec.exchange/tags/CyberAnalytics\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberAnalytics</span></a> <a href=\"https://infosec.exchange/tags/ThreatHunting\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatHunting</span></a></p><p>🔗 Project link on <a href=\"https://infosec.exchange/tags/GitHub\" class=\"mention hashtag\" rel=\"tag\">#<span>GitHub</span></a> 👉 <a href=\"https://github.com/center-for-threat-informed-defense\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/center-for-threat-i</span><span class=\"invisible\">nformed-defense</span></a></p><p><a href=\"https://infosec.exchange/tags/Infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>Infosec</span></a> <a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/Software\" class=\"mention hashtag\" rel=\"tag\">#<span>Software</span></a> <a href=\"https://infosec.exchange/tags/Technology\" class=\"mention hashtag\" rel=\"tag\">#<span>Technology</span></a> <a href=\"https://infosec.exchange/tags/News\" class=\"mention hashtag\" rel=\"tag\">#<span>News</span></a> <a href=\"https://infosec.exchange/tags/CTF\" class=\"mention hashtag\" rel=\"tag\">#<span>CTF</span></a> <a href=\"https://infosec.exchange/tags/Cybersecuritycareer\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecuritycareer</span></a> <a href=\"https://infosec.exchange/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://infosec.exchange/tags/redteam\" class=\"mention hashtag\" rel=\"tag\">#<span>redteam</span></a> <a href=\"https://infosec.exchange/tags/blueteam\" class=\"mention hashtag\" rel=\"tag\">#<span>blueteam</span></a> <a href=\"https://infosec.exchange/tags/purpleteam\" class=\"mention hashtag\" rel=\"tag\">#<span>purpleteam</span></a> <a href=\"https://infosec.exchange/tags/tips\" class=\"mention hashtag\" rel=\"tag\">#<span>tips</span></a> <a href=\"https://infosec.exchange/tags/opensource\" class=\"mention hashtag\" rel=\"tag\">#<span>opensource</span></a> <a href=\"https://infosec.exchange/tags/cloudsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cloudsecurity</span></a></p><p>— ✨<br />🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴☠️</p>",
"contentMap": {
"en": "<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>"Threat-Informed Defense" isn't just a buzzword. The Center for Threat-Informed Defense bridges MITRE ATT&CK with actionable tools like Adversary Emulation Plans and the Attack Workbench, empowering defenders to stay ahead of real-world TTPs. <a href=\"https://infosec.exchange/tags/CyberDefense\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberDefense</span></a> <a href=\"https://infosec.exchange/tags/MITREATTACK\" class=\"mention hashtag\" rel=\"tag\">#<span>MITREATTACK</span></a> </p><p>Want to map security controls to adversary behavior? Check out Mappings Explorer by the Center for Threat-Informed Defense. It aligns your defense strategy directly with the MITRE ATT&CK framework. Precision matters. <a href=\"https://infosec.exchange/tags/ThreatIntelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatIntelligence</span></a> <a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> </p><p>Attack Flow helps you visualize how attackers chain techniques into full-scale operations. An indispensable tool for understanding and mitigating attack sequences. Powered by the Center for Threat-Informed Defense. <a href=\"https://infosec.exchange/tags/SOCtools\" class=\"mention hashtag\" rel=\"tag\">#<span>SOCtools</span></a> <a href=\"https://infosec.exchange/tags/ThreatModeling\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatModeling</span></a> </p><p>TRAM leverages automation to map CTI reports directly to MITRE ATT&CK tactics and techniques. Less manual work, more actionable insights. Open-source ingenuity at its best. <a href=\"https://infosec.exchange/tags/CyberThreats\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberThreats</span></a> <a href=\"https://infosec.exchange/tags/MITREATTACK\" class=\"mention hashtag\" rel=\"tag\">#<span>MITREATTACK</span></a> </p><p>Building effective cyber analytics requires depth; "Summiting the Pyramid" delivers frameworks to challenge adversary evasion strategies. A research-backed way to harden defenses. <a href=\"https://infosec.exchange/tags/CyberAnalytics\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberAnalytics</span></a> <a href=\"https://infosec.exchange/tags/ThreatHunting\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatHunting</span></a></p><p>🔗 Project link on <a href=\"https://infosec.exchange/tags/GitHub\" class=\"mention hashtag\" rel=\"tag\">#<span>GitHub</span></a> 👉 <a href=\"https://github.com/center-for-threat-informed-defense\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/center-for-threat-i</span><span class=\"invisible\">nformed-defense</span></a></p><p><a href=\"https://infosec.exchange/tags/Infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>Infosec</span></a> <a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/Software\" class=\"mention hashtag\" rel=\"tag\">#<span>Software</span></a> <a href=\"https://infosec.exchange/tags/Technology\" class=\"mention hashtag\" rel=\"tag\">#<span>Technology</span></a> <a href=\"https://infosec.exchange/tags/News\" class=\"mention hashtag\" rel=\"tag\">#<span>News</span></a> <a href=\"https://infosec.exchange/tags/CTF\" class=\"mention hashtag\" rel=\"tag\">#<span>CTF</span></a> <a href=\"https://infosec.exchange/tags/Cybersecuritycareer\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecuritycareer</span></a> <a href=\"https://infosec.exchange/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://infosec.exchange/tags/redteam\" class=\"mention hashtag\" rel=\"tag\">#<span>redteam</span></a> <a href=\"https://infosec.exchange/tags/blueteam\" class=\"mention hashtag\" rel=\"tag\">#<span>blueteam</span></a> <a href=\"https://infosec.exchange/tags/purpleteam\" class=\"mention hashtag\" rel=\"tag\">#<span>purpleteam</span></a> <a href=\"https://infosec.exchange/tags/tips\" class=\"mention hashtag\" rel=\"tag\">#<span>tips</span></a> <a href=\"https://infosec.exchange/tags/opensource\" class=\"mention hashtag\" rel=\"tag\">#<span>opensource</span></a> <a href=\"https://infosec.exchange/tags/cloudsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cloudsecurity</span></a></p><p>— ✨<br />🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴☠️</p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/png",
"url": "https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/383/156/978/211/803/original/ffb675ada92eee2d.png",
"name": null,
"blurhash": "UJA2AaxaD*WCR*s:ayRj01WB%LayxtRjj[%L",
"width": 280,
"height": 280
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cyberdefense",
"name": "#cyberdefense"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/mitreattack",
"name": "#mitreattack"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/threatintelligence",
"name": "#threatintelligence"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/soctools",
"name": "#soctools"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/threatmodeling",
"name": "#threatmodeling"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cyberthreats",
"name": "#cyberthreats"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cyberanalytics",
"name": "#cyberanalytics"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/threathunting",
"name": "#threathunting"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/github",
"name": "#github"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/infosec",
"name": "#infosec"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/software",
"name": "#software"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/technology",
"name": "#technology"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/news",
"name": "#news"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/ctf",
"name": "#ctf"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cybersecuritycareer",
"name": "#cybersecuritycareer"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/redteam",
"name": "#redteam"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/blueteam",
"name": "#blueteam"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/purpleteam",
"name": "#purpleteam"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/tips",
"name": "#tips"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/opensource",
"name": "#opensource"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cloudsecurity",
"name": "#cloudsecurity"
}
],
"replies": {
"id": "https://infosec.exchange/users/alevsk/statuses/114383156983005500/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/alevsk/statuses/114383156983005500/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/alevsk/statuses/114383156983005500/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/alevsk/statuses/114383156983005500/likes",
"type": "Collection",
"totalItems": 1
},
"shares": {
"id": "https://infosec.exchange/users/alevsk/statuses/114383156983005500/shares",
"type": "Collection",
"totalItems": 4
}
}