diff --git a/Methodology and Resources/Network Pivoting Techniques.md b/Methodology and Resources/Network Pivoting Techniques.md
index cd4bc9e..cf82ea9 100644
--- a/Methodology and Resources/Network Pivoting Techniques.md
+++ b/Methodology and Resources/Network Pivoting Techniques.md
@@ -8,6 +8,7 @@
* [Local Port Forwarding](#local-port-forwarding)
* [Remote Port Forwarding](#remote-port-forwarding)
* [Proxychains](#proxychains)
+* [Graphtcp](#graphtcp)
* [Web SOCKS - reGeorg](#web-socks---regeorg)
* [Metasploit](#metasploit)
* [sshuttle](#sshuttle)
@@ -80,6 +81,17 @@ socks4 localhost 8080
Set the SOCKS4 proxy then `proxychains nmap -sT 192.168.5.6`
+## Graphtcp
+
+Same as proxychains, with another mechanism to "proxify" which allow Go applications.
+
+```powershell
+git clone https://github.com/hmgle/graftcp.git
+cd graftcp && make
+graftcp-local/graftcp-local
+./graftcp chromium-browser
+```
+
## Web SOCKS - reGeorg
[reGeorg](https://github.com/sensepost/reGeorg), the successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
diff --git a/SQL Injection/Images/Unicode_SQL_injection.png b/SQL Injection/Images/Unicode_SQL_injection.png
new file mode 100644
index 0000000..d9693d5
Binary files /dev/null and b/SQL Injection/Images/Unicode_SQL_injection.png differ
diff --git a/XSS Injection/README.md b/XSS Injection/README.md
index 9cdfe91..566e054 100644
--- a/XSS Injection/README.md
+++ b/XSS Injection/README.md
@@ -11,6 +11,12 @@ Cross-site scripting (XSS) is a type of computer security vulnerability typicall
- [Other ways](#other-ways)
- [Identify an XSS endpoint](#identify-an-xss-endpoint)
- [XSS in HTML/Applications](#xss-in-htmlapplications)
+ - [Common Payloads](#common-payloads)
+ - [XSS using HTML5 tags](#xss-using-html5-tags)
+ - [XSS using a remote JS](#xss-using-a-remote-js)
+ - [XSS in hidden input](#xss-in-hidden-input)
+ - [DOM based XSS](#dom-based-xss)
+ - [XSS in JS Context](#xss-in-js-context)
- [XSS in wrappers javascript and data URI](#xss-in-wrappers-javascript-and-data-uri)
- [XSS in files (XML/SVG/CSS/Flash/Markdown)](#xss-in-files)
- [XSS in PostMessage](#xss-in-postmessage)
@@ -119,16 +125,16 @@ More exploits at [http://www.xss-payloads.com/payloads-list.html?a#category=all]
## XSS in HTML/Applications
-XSS Basic
+### Common Payloads
```javascript
-Basic payload
+// Basic payload
ipt>alert('XSS')ipt>
">
">
-Img payload
+// Img payload
@@ -137,7 +143,7 @@ Img payload
">
">
-Svg payload
+// Svg payload