ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "litepub": "http://litepub.social/ns#", "directMessage": "litepub:directMessage", "Hashtag": "as:Hashtag" } ], "id": "https://infosec.exchange/users/australeo/statuses/109401443813151692", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-24T23:45:54Z", "url": "https://infosec.exchange/@australeo/109401443813151692", "attributedTo": "https://infosec.exchange/users/australeo", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/australeo/followers", "https://infosec.exchange/users/yarden_shafir" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/australeo/statuses/109401443813151692", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2022-11-24:objectId=24145482:objectType=Conversation", "content": "<p>Debugging a userland crash for the first time in ages and that means I get to use Windbg Time Travel Debugging! Combined with some of the other new features like synthetic types, this is the best debugging experience I&#39;ve ever had. And props to <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@yarden_shafir\" class=\"u-url mention\">@<span>yarden_shafir</span></a></span> for her awesome writeups of the Windbg data model: <a href=\"https://medium.com/@yardenshafir2/windbg-the-fun-way-part-2-7a904cba5435\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">medium.com/@yardenshafir2/wind</span><span class=\"invisible\">bg-the-fun-way-part-2-7a904cba5435</span></a> I&#39;ve been using this post like a cheat sheet and it&#39;s incredibly helpful.</p><p><a href=\"https://infosec.exchange/tags/windows\" class=\"mention hashtag\" rel=\"tag\">#<span>windows</span></a> <a href=\"https://infosec.exchange/tags/debugging\" class=\"mention hashtag\" rel=\"tag\">#<span>debugging</span></a> <a href=\"https://infosec.exchange/tags/reverseengineering\" class=\"mention hashtag\" rel=\"tag\">#<span>reverseengineering</span></a></p>", "contentMap": { "en": "<p>Debugging a userland crash for the first time in ages and that means I get to use Windbg Time Travel Debugging! Combined with some of the other new features like synthetic types, this is the best debugging experience I&#39;ve ever had. And props to <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@yarden_shafir\" class=\"u-url mention\">@<span>yarden_shafir</span></a></span> for her awesome writeups of the Windbg data model: <a href=\"https://medium.com/@yardenshafir2/windbg-the-fun-way-part-2-7a904cba5435\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">medium.com/@yardenshafir2/wind</span><span class=\"invisible\">bg-the-fun-way-part-2-7a904cba5435</span></a> I&#39;ve been using this post like a cheat sheet and it&#39;s incredibly helpful.</p><p><a href=\"https://infosec.exchange/tags/windows\" class=\"mention hashtag\" rel=\"tag\">#<span>windows</span></a> <a href=\"https://infosec.exchange/tags/debugging\" class=\"mention hashtag\" rel=\"tag\">#<span>debugging</span></a> <a href=\"https://infosec.exchange/tags/reverseengineering\" class=\"mention hashtag\" rel=\"tag\">#<span>reverseengineering</span></a></p>" }, "attachment": [], "tag": [ { "type": "Mention", "href": "https://infosec.exchange/users/yarden_shafir", "name": "@yarden_shafir" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/windows", "name": "#windows" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/debugging", "name": "#debugging" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/reverseengineering", "name": "#reverseengineering" } ], "replies": { "id": "https://infosec.exchange/users/australeo/statuses/109401443813151692/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/australeo/statuses/109401443813151692/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/australeo/statuses/109401443813151692/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/australeo/statuses/109401443813151692/likes", "type": "Collection", "totalItems": 13 }, "shares": { "id": "https://infosec.exchange/users/australeo/statuses/109401443813151692/shares", "type": "Collection", "totalItems": 10 } }