diff --git a/README.md b/README.md
index a496c71..5ff2531 100644
--- a/README.md
+++ b/README.md
@@ -49,7 +49,7 @@ This repository is a collection of Awesome XSS resources. Contributions are welc
- [JShell](https://github.com/UltimateHackers/JShell)
### Awesome XSS Mind Maps
-A beutiful XSS mind map by Jack Masa, [here](https://github.com/s0md3v/AwesomeXSS/blob/master/Database/jackmasa-mind-map.png)
+A beautiful XSS mind map by Jack Masa, [here](https://github.com/s0md3v/AwesomeXSS/blob/master/Database/jackmasa-mind-map.png)
### Awesome DOM XSS
@@ -234,7 +234,7 @@ A good compilation of advanced XSS exploits can be found [here](http://www.xss-p
### Awesome Probing
If nothing of this works, take a look at **Awesome Bypassing** section
-First of all, enter a non-malicious string like **d3v** and look at the source code to get an idea about number and contexts of refelections.
+First of all, enter a non-malicious string like **d3v** and look at the source code to get an idea about number and contexts of reflections.
Now for attribute context, check if double quotes (") are being filtered by entering `x"d3v`. If it gets altered to `x"d3v`, chances are that output is getting properly escaped. If this happens, try doing the same for single quotes (') by entering `x'd3v`, if it gets altered to `x'`, you are doomed. The only thing you can try is encoding.
If the quotes are not being filtered, you can simply try payloads from **Awesome Context Breaking** section.
For javascript context, check which quotes are being used for example if they are doing
@@ -249,7 +249,7 @@ But if it gets altered to `x\\\\'d3v`, the only thing you can try is closing the
```