diff --git a/CSP Bypass/README.md b/CSP Bypass/README.md
new file mode 100644
index 0000000..6bf2eef
--- /dev/null
+++ b/CSP Bypass/README.md
@@ -0,0 +1,11 @@
+# Low
+```javascript
+console.log("Welcome the the hacking word");
+```
+> Upload this script to pastebin
+
+# Medium
+> In progress
+
+# High
+> In progress
\ No newline at end of file
diff --git a/CSP Bypass/low.js b/CSP Bypass/low.js
deleted file mode 100644
index 20f03b6..0000000
--- a/CSP Bypass/low.js
+++ /dev/null
@@ -1,2 +0,0 @@
-console.log("Welcome the the hacking word");
-// Export this script to pastebin
\ No newline at end of file
diff --git a/Command Injection/README.md b/Command Injection/README.md
new file mode 100644
index 0000000..a786274
--- /dev/null
+++ b/Command Injection/README.md
@@ -0,0 +1,10 @@
+# Low
+```bash
+127.0.0.1 && ls
+```
+
+# Medium
+> In progress
+
+# High
+> In progress
diff --git a/File injection/README.md b/File injection/README.md
new file mode 100644
index 0000000..38bda9d
--- /dev/null
+++ b/File injection/README.md
@@ -0,0 +1,8 @@
+# Low
+Just upload the file `file-inject-low.png` and you will get the flag.
+
+# Medium
+> In progress
+
+# High
+> In progress
\ No newline at end of file
diff --git a/Javascript/low.js b/Javascript/README.md
similarity index 50%
rename from Javascript/low.js
rename to Javascript/README.md
index 7e8bdff..ac3f81a 100644
--- a/Javascript/low.js
+++ b/Javascript/README.md
@@ -1,3 +1,12 @@
+# Low
+```javascript
const phrase = document.getElementById("phrase").value;
const token = md5(rot13(phrase));
-console.log(token);
\ No newline at end of file
+console.log(token);
+```
+
+# Medium
+> In progress
+
+# High
+> In progress
\ No newline at end of file
diff --git a/README.md b/README.md
new file mode 100644
index 0000000..2a69f62
--- /dev/null
+++ b/README.md
@@ -0,0 +1,9 @@
+# EPITA-DVWA
+
+My journey through application vulnerability using Damn Vulnerable Web Application (DVWA).
+
+## What is DVWA?
+DVWA is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.
+
+## How this repository is organized?
+This repository is organized by the different vulnerabilities that I have found in DVWA. Each vulnerability has its own folder and contains a README.md file that explains the vulnerability and how to exploit it.
\ No newline at end of file
diff --git a/SQL Injection/README.md b/SQL Injection/README.md
new file mode 100644
index 0000000..901e82f
--- /dev/null
+++ b/SQL Injection/README.md
@@ -0,0 +1,7 @@
+# Low
+Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit#
+
+# Medium
+> In progress
+# High
+> In progress
\ No newline at end of file
diff --git a/SQL Injection/low.txt b/SQL Injection/low.txt
deleted file mode 100644
index 03116cf..0000000
--- a/SQL Injection/low.txt
+++ /dev/null
@@ -1 +0,0 @@
-Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit#
\ No newline at end of file
diff --git a/XSS (DOM)/README.md b/XSS (DOM)/README.md
new file mode 100644
index 0000000..74acb03
--- /dev/null
+++ b/XSS (DOM)/README.md
@@ -0,0 +1,8 @@
+# Low
+Full URL : [http://localhost:4280/vulnerabilities/xss_d/?default=French]()
+
+# Medium
+> In progress
+
+# High
+> In progress
\ No newline at end of file
diff --git a/XSS (DOM)/low.txt b/XSS (DOM)/low.txt
deleted file mode 100644
index 4700b3c..0000000
--- a/XSS (DOM)/low.txt
+++ /dev/null
@@ -1 +0,0 @@
-http://localhost:4280/vulnerabilities/xss_d/?default=French
\ No newline at end of file
diff --git a/XSS (Stored)/README.md b/XSS (Stored)/README.md
new file mode 100644
index 0000000..19fa1d3
--- /dev/null
+++ b/XSS (Stored)/README.md
@@ -0,0 +1,9 @@
+# Low
+```javascript
+
+````
+# Medium
+> In progress
+
+# High
+> In progress
\ No newline at end of file