Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Downloads

Tiny banker aka Tinba Source

Paul Anderson by Paul Anderson
September 19, 2014
in Downloads
0
0yeE2bS
75
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Tinba got its name from its extraordinarily small size – its code is approximately 20 kilobytes in size, a remarkably small number for banking malware. Tinba is a combination of the words tiny and banker; the same malware is also known as Tinybanker and Zusy.

Download

You might also like

Unveiling the mask V1.0

Malwarebytes Anti-Exploit BETA Released

Blackshades 2.6.3 Source

Tags: malwaresource codeTinbaTiny Banker
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Unveiling the mask V1.0

by Paul Anderson
July 14, 2016 - Updated on May 20, 2022
0
Unveiling the mask V1.0

Unveiling the mask V1.0, pdf write-up, and analysis by Kaspersky Labs. Excerpt from the writeup: The Mask is an advanced threat actor that has been involved in cyber-espionage...

Read more

Malwarebytes Anti-Exploit BETA Released

by Paul Anderson
October 5, 2013 - Updated on December 6, 2013
0
Malwarebytes Anti-Exploit BETA Released

Malwarebytes Anti-exploit is a new application made by the makers of the freeware anti-virus, Malwarebytes. Protects Internet Explorer, Firefox, Chrome, and Opera browsers Protects browser components, including Java...

Read more

Blackshades 2.6.3 Source

by Paul Anderson
September 2, 2013 - Updated on September 17, 2013
0
Blackshades 2.6.3 Source

Blackshades full source, coded in Visual Basics 6. Blackshades Remote Controller is a RAT (Remote Administration Application) which allows a user to control several clients from around the...

Read more

BACKBOX 3.05 A new Linux Pen-Testing Distribution

by Paul Anderson
May 29, 2013
0
BACKBOX 3.05 A new Linux Pen-Testing Distribution

Last week the Linux Foundation announced a new distribution for BackBox Linux 3.05, which incorporates the kernel of Linux 3.2. This distribution is similar to backtrack and is...

Read more

PySQLi – Python SQL injection framework

by Paul Anderson
November 4, 2012
0
PySQLi – Python SQL injection framework

PySQLi is a python framework designed to exploit complex SQL injection vulnerabilities. It provides dedicated bricks that can be used to build advanced exploits or easily extended/improved to...

Read more
Next Post
Was Backoff POS Malware Responsible for Home Depot Breach?

Was Backoff POS Malware Responsible for Home Depot Breach?

Related News

Netwire RAT seized by FBI and other worldwide police agencies

Netwire RAT seized by FBI and other worldwide police agencies

March 16, 2023
The Emotet botnet returns and is sending a slew of malicious emails

The Emotet botnet returns and is sending a slew of malicious emails

March 14, 2023
Update-resistant malware infects SonicWall security appliances

Update-resistant malware infects SonicWall security appliances

March 12, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.