Event JSON
{
"id": "a2675cf36abcc2283424aefeadd09a7cf5647b46ea84e67d36808e6c35c5afef",
"pubkey": "f39833f08e0f05972be0604735d51ec700fb118d49d02a79bf6447093138c8e2",
"created_at": 1724310414,
"kind": 1,
"tags": [
[
"proxy",
"https://infosec.place/objects/f510bb29-e3cf-4299-b829-1675fb728904",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.place/objects/f510bb29-e3cf-4299-b829-1675fb728904",
"pink.momostr"
],
[
"-"
]
],
"content": "[RSS] An Introduction to GCPwn – Parts 2 and 3\n\nhttps://www.netspi.com/blog/technical-blog/cloud-pentesting/introduction-to-gcpwn-parts-2-and-3/",
"sig": "116e699cf7ba64b56ca22ea66a53ae696a2e5cbb56288795b44fc019ebe7ed4c2dae23dee80f44c2eb7a5bf73b0e39757d02f0da005c806c5f219aa8f063dac0"
}