Recantly i have publish a post dealing with an old security issue, with all that related to using signature based mechanism in order to block malware content.
As mantioned in that article i have used a theoretical tool that might bypass some of the Security Web proxy availble.
From time to time , i will publish some POC that were produced with that theoretical tool.
It is strictly written for educational purpose. Use it at
your own risk. Author will not bare any responsibility for any damages watsoever
See samples here