Unusual firewall bypassing techniques, network and computer security.

After a while, finding that nothing more happened, she decided on going into the garden at once; but, alas for poor Alice! when she got to the door, she found she had forgotten the little golden key, and when she went back to the table for it, she found she could not possibly reach it: she could see it quite plainly through the glass, and she tried her best to climb up one of the legs of the table, but it was too slippery; and when she had tired herself out with trying, the poor little thing sat down and cried.

Lewis Carroll "Alice In Wonderland"
Chinese French Russian Spanish Polish Italian
Home | Projects | Papers | Forum | Team | Links | Contributions

A funny poc to convert a text file into one or several png images and send them to a remote CGI in HTTP POST requests so that the network based "detector" has to figure if all POST images it monitors are legitimate or suspicious.

This project was originally released at Hitchhiker's World Issue #10 (have a look at

Current HttPostNG version: 0.3; README, Examples
Download | md5sum: 2625d46c6f2e25f70e036b47389e3247

Index of projects

Paper : Reverse Tunneling Techniques: theoretical requirements for the GW implementation.

Team member's sites: hhworld/ The Hitchhiker's World e-zine

GNU  GNU General Public License
 GNU Free Documentation License