diff --git a/README.md b/README.md
index 7f8760d..6118782 100755
--- a/README.md
+++ b/README.md
@@ -41,6 +41,7 @@ If you have any trouble with Ghost you should have a look to the documentation :
chmod +x ./launch
./launch
```
+Note: if Gunicorn fail you should launch the "server.py" instead
3 - Edit the server configuration in popup.js and background.js with your server's informations
```
var config_server = "http://127.0.0.1:8000";
@@ -51,4 +52,8 @@ You can try the Error SQL, Blind SQL, LFI with Damn Vulnerable Web App
## Thanks
- Polyglot vector for SQL injections [The Ultimate SQL Injection Payload](https://labs.detectify.com/2013/05/29/the-ultimate-sql-injection-payload/)
- Polyglot vector for XSS injection 1 [One vector to rule them all](http://www.thespanner.co.uk/2010/09/15/one-vector-to-rule-them-all/)
-- Polyglot vector for XSS injection 2 [Unleashing an Ultimate XSS Polyglot](https://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot)
\ No newline at end of file
+- Polyglot vector for XSS injection 2 [Unleashing an Ultimate XSS Polyglot](https://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot)
+
+# TODO
+- Verify=False in requests..
+- OpenURL redirect ?
\ No newline at end of file
diff --git a/Server/launch.sh b/Server/launch.sh
index 3e96981..78063c2 100755
--- a/Server/launch.sh
+++ b/Server/launch.sh
@@ -1 +1 @@
-gunicorn --workers=3 server:app --timeout 90
+gunicorn --workers=3 server:app --timeout 360
diff --git a/Server/scans.py b/Server/scans.py
index d96b7cd..6c77e1e 100644
--- a/Server/scans.py
+++ b/Server/scans.py
@@ -12,7 +12,6 @@ Parameters: vulns - list of vulnerabilities, url - address of the target, fuzz -
"""
def scan_xss(method, vulns, url, fuzz, cookie, useragent, firefox, data):
payload = 'jaVasCript:alert(1)//" name=alert(1) onErrOr=eval(name) src=1 autofocus oNfoCus=eval(name)>" >|\>@gmail.com\'-->" >">\'">