ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "litepub": "http://litepub.social/ns#", "directMessage": "litepub:directMessage", "blurhash": "toot:blurhash", "focalPoint": { "@container": "@list", "@id": "toot:focalPoint" }, "Hashtag": "as:Hashtag" } ], "id": "https://infosec.exchange/users/alevsk/statuses/114383156983005500", "type": "Note", "summary": null, "inReplyTo": null, "published": "2025-04-22T19:01:04Z", "url": "https://infosec.exchange/@alevsk/114383156983005500", "attributedTo": "https://infosec.exchange/users/alevsk", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/alevsk/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/alevsk/statuses/114383156983005500", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2025-04-22:objectId=264092749:objectType=Conversation", "content": "<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>&quot;Threat-Informed Defense&quot; isn&#39;t just a buzzword. The Center for Threat-Informed Defense bridges MITRE ATT&amp;CK with actionable tools like Adversary Emulation Plans and the Attack Workbench, empowering defenders to stay ahead of real-world TTPs. <a href=\"https://infosec.exchange/tags/CyberDefense\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberDefense</span></a> <a href=\"https://infosec.exchange/tags/MITREATTACK\" class=\"mention hashtag\" rel=\"tag\">#<span>MITREATTACK</span></a> </p><p>Want to map security controls to adversary behavior? Check out Mappings Explorer by the Center for Threat-Informed Defense. It aligns your defense strategy directly with the MITRE ATT&amp;CK framework. Precision matters. <a href=\"https://infosec.exchange/tags/ThreatIntelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatIntelligence</span></a> <a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> </p><p>Attack Flow helps you visualize how attackers chain techniques into full-scale operations. An indispensable tool for understanding and mitigating attack sequences. Powered by the Center for Threat-Informed Defense. <a href=\"https://infosec.exchange/tags/SOCtools\" class=\"mention hashtag\" rel=\"tag\">#<span>SOCtools</span></a> <a href=\"https://infosec.exchange/tags/ThreatModeling\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatModeling</span></a> </p><p>TRAM leverages automation to map CTI reports directly to MITRE ATT&amp;CK tactics and techniques. Less manual work, more actionable insights. Open-source ingenuity at its best. <a href=\"https://infosec.exchange/tags/CyberThreats\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberThreats</span></a> <a href=\"https://infosec.exchange/tags/MITREATTACK\" class=\"mention hashtag\" rel=\"tag\">#<span>MITREATTACK</span></a> </p><p>Building effective cyber analytics requires depth; &quot;Summiting the Pyramid&quot; delivers frameworks to challenge adversary evasion strategies. A research-backed way to harden defenses. <a href=\"https://infosec.exchange/tags/CyberAnalytics\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberAnalytics</span></a> <a href=\"https://infosec.exchange/tags/ThreatHunting\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatHunting</span></a></p><p>🔗 Project link on <a href=\"https://infosec.exchange/tags/GitHub\" class=\"mention hashtag\" rel=\"tag\">#<span>GitHub</span></a> 👉 <a href=\"https://github.com/center-for-threat-informed-defense\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/center-for-threat-i</span><span class=\"invisible\">nformed-defense</span></a></p><p><a href=\"https://infosec.exchange/tags/Infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>Infosec</span></a> <a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/Software\" class=\"mention hashtag\" rel=\"tag\">#<span>Software</span></a> <a href=\"https://infosec.exchange/tags/Technology\" class=\"mention hashtag\" rel=\"tag\">#<span>Technology</span></a> <a href=\"https://infosec.exchange/tags/News\" class=\"mention hashtag\" rel=\"tag\">#<span>News</span></a> <a href=\"https://infosec.exchange/tags/CTF\" class=\"mention hashtag\" rel=\"tag\">#<span>CTF</span></a> <a href=\"https://infosec.exchange/tags/Cybersecuritycareer\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecuritycareer</span></a> <a href=\"https://infosec.exchange/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://infosec.exchange/tags/redteam\" class=\"mention hashtag\" rel=\"tag\">#<span>redteam</span></a> <a href=\"https://infosec.exchange/tags/blueteam\" class=\"mention hashtag\" rel=\"tag\">#<span>blueteam</span></a> <a href=\"https://infosec.exchange/tags/purpleteam\" class=\"mention hashtag\" rel=\"tag\">#<span>purpleteam</span></a> <a href=\"https://infosec.exchange/tags/tips\" class=\"mention hashtag\" rel=\"tag\">#<span>tips</span></a> <a href=\"https://infosec.exchange/tags/opensource\" class=\"mention hashtag\" rel=\"tag\">#<span>opensource</span></a> <a href=\"https://infosec.exchange/tags/cloudsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cloudsecurity</span></a></p><p>— ✨<br />🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>", "contentMap": { "en": "<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>&quot;Threat-Informed Defense&quot; isn&#39;t just a buzzword. The Center for Threat-Informed Defense bridges MITRE ATT&amp;CK with actionable tools like Adversary Emulation Plans and the Attack Workbench, empowering defenders to stay ahead of real-world TTPs. <a href=\"https://infosec.exchange/tags/CyberDefense\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberDefense</span></a> <a href=\"https://infosec.exchange/tags/MITREATTACK\" class=\"mention hashtag\" rel=\"tag\">#<span>MITREATTACK</span></a> </p><p>Want to map security controls to adversary behavior? Check out Mappings Explorer by the Center for Threat-Informed Defense. It aligns your defense strategy directly with the MITRE ATT&amp;CK framework. Precision matters. <a href=\"https://infosec.exchange/tags/ThreatIntelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatIntelligence</span></a> <a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> </p><p>Attack Flow helps you visualize how attackers chain techniques into full-scale operations. An indispensable tool for understanding and mitigating attack sequences. Powered by the Center for Threat-Informed Defense. <a href=\"https://infosec.exchange/tags/SOCtools\" class=\"mention hashtag\" rel=\"tag\">#<span>SOCtools</span></a> <a href=\"https://infosec.exchange/tags/ThreatModeling\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatModeling</span></a> </p><p>TRAM leverages automation to map CTI reports directly to MITRE ATT&amp;CK tactics and techniques. Less manual work, more actionable insights. Open-source ingenuity at its best. <a href=\"https://infosec.exchange/tags/CyberThreats\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberThreats</span></a> <a href=\"https://infosec.exchange/tags/MITREATTACK\" class=\"mention hashtag\" rel=\"tag\">#<span>MITREATTACK</span></a> </p><p>Building effective cyber analytics requires depth; &quot;Summiting the Pyramid&quot; delivers frameworks to challenge adversary evasion strategies. A research-backed way to harden defenses. <a href=\"https://infosec.exchange/tags/CyberAnalytics\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberAnalytics</span></a> <a href=\"https://infosec.exchange/tags/ThreatHunting\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatHunting</span></a></p><p>🔗 Project link on <a href=\"https://infosec.exchange/tags/GitHub\" class=\"mention hashtag\" rel=\"tag\">#<span>GitHub</span></a> 👉 <a href=\"https://github.com/center-for-threat-informed-defense\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/center-for-threat-i</span><span class=\"invisible\">nformed-defense</span></a></p><p><a href=\"https://infosec.exchange/tags/Infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>Infosec</span></a> <a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/Software\" class=\"mention hashtag\" rel=\"tag\">#<span>Software</span></a> <a href=\"https://infosec.exchange/tags/Technology\" class=\"mention hashtag\" rel=\"tag\">#<span>Technology</span></a> <a href=\"https://infosec.exchange/tags/News\" class=\"mention hashtag\" rel=\"tag\">#<span>News</span></a> <a href=\"https://infosec.exchange/tags/CTF\" class=\"mention hashtag\" rel=\"tag\">#<span>CTF</span></a> <a href=\"https://infosec.exchange/tags/Cybersecuritycareer\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecuritycareer</span></a> <a href=\"https://infosec.exchange/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://infosec.exchange/tags/redteam\" class=\"mention hashtag\" rel=\"tag\">#<span>redteam</span></a> <a href=\"https://infosec.exchange/tags/blueteam\" class=\"mention hashtag\" rel=\"tag\">#<span>blueteam</span></a> <a href=\"https://infosec.exchange/tags/purpleteam\" class=\"mention hashtag\" rel=\"tag\">#<span>purpleteam</span></a> <a href=\"https://infosec.exchange/tags/tips\" class=\"mention hashtag\" rel=\"tag\">#<span>tips</span></a> <a href=\"https://infosec.exchange/tags/opensource\" class=\"mention hashtag\" rel=\"tag\">#<span>opensource</span></a> <a href=\"https://infosec.exchange/tags/cloudsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cloudsecurity</span></a></p><p>— ✨<br />🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>" }, "attachment": [ { "type": "Document", "mediaType": "image/png", "url": "https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/383/156/978/211/803/original/ffb675ada92eee2d.png", "name": null, "blurhash": "UJA2AaxaD*WCR*s:ayRj01WB%LayxtRjj[%L", "width": 280, "height": 280 } ], "tag": [ { "type": "Hashtag", "href": "https://infosec.exchange/tags/cyberdefense", "name": "#cyberdefense" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/mitreattack", "name": "#mitreattack" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/threatintelligence", "name": "#threatintelligence" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/soctools", "name": "#soctools" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/threatmodeling", "name": "#threatmodeling" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cyberthreats", "name": "#cyberthreats" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cyberanalytics", "name": "#cyberanalytics" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/threathunting", "name": "#threathunting" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/github", "name": "#github" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/infosec", "name": "#infosec" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/software", "name": "#software" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/technology", "name": "#technology" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/news", "name": "#news" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/ctf", "name": "#ctf" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cybersecuritycareer", "name": "#cybersecuritycareer" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/redteam", "name": "#redteam" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/blueteam", "name": "#blueteam" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/purpleteam", "name": "#purpleteam" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/tips", "name": "#tips" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/opensource", "name": "#opensource" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cloudsecurity", "name": "#cloudsecurity" } ], "replies": { "id": "https://infosec.exchange/users/alevsk/statuses/114383156983005500/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/alevsk/statuses/114383156983005500/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/alevsk/statuses/114383156983005500/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/alevsk/statuses/114383156983005500/likes", "type": "Collection", "totalItems": 1 }, "shares": { "id": "https://infosec.exchange/users/alevsk/statuses/114383156983005500/shares", "type": "Collection", "totalItems": 4 } }