diff --git a/README.md b/README.md
index 764b78f..e303294 100644
--- a/README.md
+++ b/README.md
@@ -1,2 +1,80 @@
# XSSight
-It is script that can scan for XSS vulnerabilites and inject payloads.
+
+XSSight is an XSS Scanner and Payload Injector.
+
+## Usages
+
+##### Scanning for payload
+
+```
+root@kali:~# python /root/XSSight/xssight.py
+ .-'^`\ /`^'-.
+ .' ___\ /___ `.
+ / /.---. .---.\ `
+ | // '-. ___________________________ .-' \ |
+ | ;| \/--------------------------// |; |
+ \ || |\_) XSSight (_/| || /
+ \ | \ . \ ; | By Team Ultimate || ; / . / | /
+ '\_\ \ \ \ \ | ||/ / / // /_/'
+ \ \ \ \| Beta Release |/ / / //
+ `'-\_\_\ teamultimate.in /_/_/-'`
+ '--------------------------'
+ These types of URLs are accepted
+ Example: http://www.dwebsite.com/
+ Example: http://www.website.com=
+ Example: http://www.website.com?
+
+ Enter target url: teamultimate.in/test.php?q=1
+
+------------------------------
+Select an operation:
+------------------------------
+ 1. XSS Scanner
+ 2. Payload Injector
+ Enter your choice [1-2] : 1
+------------------------------
+Date: Thu, 13 Apr 2017 10:29:37 GMT
+Server: Apache/2.2.3 (CentOS)
+Cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
+Set-Cookie: PHPSESSID=uuoseraa5aeaqct5urq2bfu766; path=/
+Expires: Thu, 19 Nov 1981 08:52:00 GMT
+Pragma: no-cache
+Vary: Accept-Encoding,User-Agent
+Connection: close
+Content-Type: text/html; charset=UTF-8
+
+* scanning GET parameter 'q'
+ (i) GET parameter 'q' appears to be XSS vulnerable ("", enclosed by