Assiste.com - Sécurité informatique - Vie privée sur le Web - Neutralité d'Internet Assiste.com - Sécurité informatique - Vie privée sur le Web - Neutralité d'Internet

Hostile Java

Hostile Java : documents (cours, schémas, modes d'emploi, guides d'exploitation de failles de sécurité Java, etc.) et applets Java hostiles (malveillantes).

cr  01.04.2012      r+  21.08.2020      r-  20.04.2024      Pierre Pinard.         (Alertes et avis de sécurité au jour le jour)

On classe dans les « Hostile Java » tous les documents (cours, schémas, modes d'emploi, guides d'exploitation de failles de sécurité Java, etc.) ainsi que toutes les applets Java hostiles (malveillantes).

Quelques exemples d'applets Java hostiles :

NomDate de créationAliasAuteur
Applet Java05 November 1996
AppletKiller.java09 April 2000Appkiller.src trojan, Trojan.Java.AppletKillerMark D. LaDue
Assassin.Java11 February 1998
Assert30 November 1997
Attack Thread08 May 1996
Attacker.Java12 August 1997
Attackframe11 February 1998
Attackthread20 February 1996Mark D. LaDue
AudioKiller30 May 2000
Beginner12 August 1997
Button01 September 2003
CacheC08 October 1998
Calculator11 February 1998
Consume18 February 1997Mark D. LaDue
Crash14 December 1997
CrashCom 4.0530 May 2000
Disk Hog30 May 2000
Do My Work05 November 1996
Domywork11 February 1998Mark D. LaDue
Double Trouble05 November 1996
Doubleframe11 February 1998
Doubletrouble11 February 1998
Drummer30 November 1997
Dupe11 August 1997
Error Message05 November 1996
Errorframe11 February 1998
Errormessage11 February 1998
Errorpanel11 February 1998
File List06 December 1999
Fingerprint Java Hoax26 April 1996
Forger11 February 1998
Friend30 November 1997
Getfactor11 February 1998
Hang30 November 1997
Hijacker11 February 1998
Homer11 August 1997
Hose Mocha12 August 1997
HoseCom 40430 May 2000
Hostile Java23 September 1998
Hostile Threads11 August 1997
J-Abraham 1.126 September 2000MayheM [ExileCrew]
Java FTP Hack 0.1002 October 1999Matteo Baccan
Javatel30 November 1997
Keel30 November 1997
Killer14 August 2000
Killer124 December 1997
Login11 February 1998
Loginserversocket28 February 1996Mark D. LaDue
Mutator12 August 1997
Mutator111 February 1998
Netscope30 November 1997
Noisy Bear05 November 1996
Outpanel11 February 1998
Pen Pal05 November 1996
Penpal11 February 1998
PublicEnemy12 August 1997
Report11 August 1997
Reportserversocket11 August 1997
Scapegoat11 February 1998
Shootingmenu Applet27 December 1996Demicron
Silent Threat11 August 1997
Silentframe11 February 1998
SocketThread.java11 May 1999
Threadassassin11 February 1998
Threadkiller11 February 1998
TicketHolder10 October 1996Jim Buzbee
Triple Threat30 November 1997
Tripleframe11 February 1998
Triplethreat17 February 1996Mark D. LaDue
Ungrateful28 February 1996Mark D. LaDue
Ungrateful Java11 February 1998
Urname04 December 1997
Warningpanel11 February 1998
Wasteful17 February 1996Mark D. LaDue
Who You Are04 December 1997
WINSF__k.java19 December 1999Wyzewun

Dossier (collection) : Classes de malveillances

Adware – (Afficheur de publicités)
Adware intrusif
Anarchie
ANSI Bomb
AOL Pest
Automate d'appels téléphoniques
Banker – (Malware Banker, Malware Banking, Trojan Banker, Trojan Banking, Virus Banker, Virus Banking)
Barres d'outils
BHO – (BHOsBrowser Helper Object)
BBinder – (classeur de fichiersréorganiseur de fichiers morcelésréassemblage de fichiers morcelés)
Bluejacking – (exploitation des vulnérabilités du Bluetooth)
Bluesnarfing – (exploitation silencieuse de la technologie Bluetooth)
Bot – (Robots)
Botnet – (Réseau de robots)
Botnet as a Service – (BaaS)
C&CCommand and Control
Calcul distribué
Cheval de Troie – (Trojan)
Cookie de tracking – (Trackware Cookie)
Cracking Doc – (Document de crackage)
Cracking Misc – (Craquage Divers)
Cracking tools – (Outils de crack)
Crypto-ransomware
Cryptoware
DDoS – (Déni de Service DistribuéDistributed Denial of Service)
DNS hijacking – (DNS hijackerRedirection DNS)
DoS – (Déni de serviceDenial of Service)
Dropper – (Virus compte-gouttesDropper virus)
Encryption Tool
Explosives
Firewall Killer – (Tueur de pare-feu)
Flood (InondationDélugeInondation informatiqueInondation numérique)
Flooder (Computer science floodInondation numériqueinondation informatiqueDéluge informatiqueNoyer un ordinateurNoyage numériqueNoyage d’ordinateurs)
Fraudes 419 (Spam 419Spam africainSpam nigérien)
Hacking tools – (Outils de hack)
Hacking Tutorial (Tutoriel de piratage)
Hijacker (Pirate de navigateurDétournement de navigateur)
Hostile ActiveX
Hostile Java
Hostile Script
IRC War
Keygen
Key Generator
Keylogger
Loader
Lockpicking
Macrovirus
Mail Bomb
Mail Bomber
Mailer
Malvertising
Malware as a Service – (MaaS)
Misc
Misc Doc
Misc Tool
Modificateurs des SERP (Search Engine Results Page) des moteurs de recherche – (résultats moteurs de recherche menteurs)
NetTool
Notifier
Nuker
Outils de création de privilèges
Outils révélateurs de mots de passe
P2P BotNet
Packer (compression, encryptage)
Password Cracker
Password Cracking Word List
Password Stealer (Spyware PasswordStealer Steal stored credentials USB Password stealer)
Patch
PHA (applications potentiellement nuisibles)
Phishing
Phreak (Phreaker Phreaking)
Phreaking Text
Phreaking Tool
Pirateware
Profiling
Rançongiciel
Ransomware
RAT Remote Administration Tool (Outil d'administration à distance)
Redirection DNS
Remballe
Revenge porn
Rip (Ripoff Rip-off Ripper Rippeur Ripping)
Scanner de ports
SMiShing (phishing par SMS)
Spam – (courriel indésirableemail ennuyeux email virus courriel publicitaire)
Spam tool
Spam vocal
Spoofer
Spoofing (Usurpation)
Spyware (Theft)
Stealer
Super-Cookies
Sybil attack
Tracking
Trojan Creation Tool
Trojan Source
Truelleware (Shovelware)
Trustjacking
Typosquatting
Video jacking
Virus
Virus PEBCAK
War Dialer – (Janning)
Worm – (verpropagationvirus)
Worm creation tool(Outils de création de virusOutils de création de vers)
Zombie
Zombification