Flux RSS - La vie du site - Nouveautés et mises à jour
Assiste.com - Sécurité informatique - Vie privée sur le Web - Neutralité d'Internet Assiste.com - Sécurité informatique - Vie privée sur le Web - Neutralité d'Internet

Hostile Java

Hostile Java -

01.10.2022 : Pierre Pinard.

On classe dans les « Hostile Java » tous les documents (cours, schémas, modes d'emploi, guides d'exploitation de failles de sécurité Java, etc.) ainsi que toutes les applets Java hostiles (malveillantes).

Quelques exemples d'applets Java hostiles :

NomDate de créationAliasAuteur
Applet Java05 November 1996
AppletKiller.java09 April 2000Appkiller.src trojan, Trojan.Java.AppletKillerMark D. LaDue
Assassin.Java11 February 1998
Assert30 November 1997
Attack Thread08 May 1996
Attacker.Java12 August 1997
Attackframe11 February 1998
Attackthread20 February 1996Mark D. LaDue
AudioKiller30 May 2000
Beginner12 August 1997
Button01 September 2003
CacheC08 October 1998
Calculator11 February 1998
Consume18 February 1997Mark D. LaDue
Crash14 December 1997
CrashCom 4.0530 May 2000
Disk Hog30 May 2000
Do My Work05 November 1996
Domywork11 February 1998Mark D. LaDue
Double Trouble05 November 1996
Doubleframe11 February 1998
Doubletrouble11 February 1998
Drummer30 November 1997
Dupe11 August 1997
Error Message05 November 1996
Errorframe11 February 1998
Errormessage11 February 1998
Errorpanel11 February 1998
File List06 December 1999
Fingerprint Java Hoax26 April 1996
Forger11 February 1998
Friend30 November 1997
Getfactor11 February 1998
Hang30 November 1997
Hijacker11 February 1998
Homer11 August 1997
Hose Mocha12 August 1997
HoseCom 40430 May 2000
Hostile Java23 September 1998
Hostile Threads11 August 1997
J-Abraham 1.126 September 2000MayheM [ExileCrew]
Java FTP Hack 0.1002 October 1999Matteo Baccan
Javatel30 November 1997
Keel30 November 1997
Killer14 August 2000
Killer124 December 1997
Login11 February 1998
Loginserversocket28 February 1996Mark D. LaDue
Mutator12 August 1997
Mutator111 February 1998
Netscope30 November 1997
Noisy Bear05 November 1996
Outpanel11 February 1998
Pen Pal05 November 1996
Penpal11 February 1998
PublicEnemy12 August 1997
Report11 August 1997
Reportserversocket11 August 1997
Scapegoat11 February 1998
Shootingmenu Applet27 December 1996Demicron
Silent Threat11 August 1997
Silentframe11 February 1998
SocketThread.java11 May 1999
Threadassassin11 February 1998
Threadkiller11 February 1998
TicketHolder10 October 1996Jim Buzbee
Triple Threat30 November 1997
Tripleframe11 February 1998
Triplethreat17 February 1996Mark D. LaDue
Ungrateful28 February 1996Mark D. LaDue
Ungrateful Java11 February 1998
Urname04 December 1997
Warningpanel11 February 1998
Wasteful17 February 1996Mark D. LaDue
Who You Are04 December 1997
WINSF__k.java19 December 1999Wyzewun
# # # # # # # # # # # # # # # # # # # # # # # # # # # # #

Dossier (collection) : Classes de malveillances

Adware
Adware intrusif
Anarchie
ANSI Bomb
AOL Pest
Automate d'appels téléphoniques
Banker (Malware Banker, Malware Banking, Trojan Banker, Trojan Banking, Virus Banker, Virus Banking)
Barres d'outils
BHO - BHOs - Browser Helper Object
Binder
Bluejacking - exploitation des vulnérabilités du Bluetooth
Bluesnarfing - exploitation silencieuse de la technologie Bluetooth
Bot
Botnet
Botnet as a Service (BaaS)
C&C - Command and Control
Calcul distribué
Cheval de Troie (Trojan)
Cookie de tracking (Trackware Cookie)
Cracking Doc
Cracking Misc
Cracking tools - Outils de crack
Crypto-ransomware
Cryptoware
DDoS
DNS hijacking (DNS hijacker - Redirection DNS)
DoS
Dropper - (Virus compte-gouttes)
Encryption Tool
Explosives
Firewall Killer
Flood
Flooder
Fraudes 419 (Spam 419 - Spam africain - Spam nigérien)
Hacking tools - Outils de hack
Hacking Tutorial
Hijacker
Hostile ActiveX
Hostile Java
Hostile Script
IRC War
Keygen
Key Generator
Keylogger
Loader
Lockpicking
Macrovirus
Mail Bomb
Mail Bomber
Mailer
Malvertising
Malware as a Service (MaaS)
Misc
Misc Doc
Misc Tool
Modificateurs des SERP des moteurs de recherche (résultats menteurs)
NetTool
Notifier
Nuker
Outils de création de privilèges
Outils révélateurs de mots de passe
P2P BotNet
Packer (compression, encryptage)
Password Cracker
Password Cracking Word List
Password Stealer (Spyware PasswordStealer - Steal stored credentials - USB Password stealer)
Patch
PHA (applications potentiellement nuisibles)
Phishing
Phreak (Phreaker - Phreaking)
Phreaking Text
Phreaking Tool
Pirateware
Profiling
Rançongiciel
Ransomware
RAT Remote Administration Tool (Outil d'administration à distance)
Redirection DNS
Remballe
Revenge porn
Rip (Ripoff - Rip-off - Ripper - Rippeur - Ripping)
Scanner de ports
SMiShing (phishing par SMS)
Spam (courriel indésirable, email ennuyeux, email virus, courriel publicitaire)
Spam tool
Spam vocal
Spoofer
Spoofing (Usurpation)
Spyware (Theft)
Stealer
Super-Cookies
Sybil attack
Tracking
Trojan Creation Tool
Trojan Source
Truelleware (shovelware)
Trustjacking
Typosquatting
Video jacking
Virus
Virus PEBCAK
War Dialer (Janning)
Worm (ver, propagation, virus)
Worm creation tool
Zombie
Zombification