diff --git a/XSS.md b/XSS.md
new file mode 100644
index 0000000..d00bdc4
--- /dev/null
+++ b/XSS.md
@@ -0,0 +1,409 @@
+# XSS (Cross Site Scripting)
+**Web Content-Types to XSS**
+
+The following content types can execute XSS in all browsers:
+* text/html
+* application/xhtml+xml
+* application/xml
+* text/xml
+* image/svg+xml
+* text/plain (?? not in the list but I think I saw this in a CTF)
+* application/rss+xml (off)
+* application/atom+xml (off)
+
+In other browsers other Content-Types can be used to execute arbitrary JS, check:
+
+https://github.com/BlackFan/content-type-research/blob/master/XSS.md
+
+**xml Content Type**
+
+If the page is returnin a text/xml content-type it's possible to indicate a namespace and execute arbitrary JS
+```javascript
+
+hello
+
+
+
+
+```
+
+
+-----
+**Injecting inside raw HTML**
+
+```javascript
+
+
+
+