diff --git a/payloads/library/exfiltration/optical-exfiltration/index.min.html b/payloads/library/exfiltration/optical-exfiltration/index.min.html
index 811af6c7..0dcd69d6 100644
--- a/payloads/library/exfiltration/optical-exfiltration/index.min.html
+++ b/payloads/library/exfiltration/optical-exfiltration/index.min.html
@@ -4,17 +4,17 @@
QR Extract
-
+
diff --git a/payloads/library/exfiltration/optical-exfiltration/payload.txt b/payloads/library/exfiltration/optical-exfiltration/payload.txt
index a7463e39..6f70b5df 100755
--- a/payloads/library/exfiltration/optical-exfiltration/payload.txt
+++ b/payloads/library/exfiltration/optical-exfiltration/payload.txt
@@ -12,11 +12,20 @@
# and open a browser, to exfiltrate data Using QR Codes and a video
# recording device.
#
+# Optional html params:
+# base64: Passing a base64 string to this param will auto-start processing QR Codes.
+#
+# playback: Passing the string "finish" to this param will auto-play the results,
+# when QR codes finish rendering.
+#
+# Example:
+# Ln65: Q STRING firefox "$target_html?playback=finish&base64=my_long_string"
+#
# | Attack Stage | Description |
# | ------------------- | ---------------------------------------- |
# | SETUP | Open vi |
# | ATTACK | Writing HTML |
-# | FINISH | Browser Ready |
+# | FINISH | Browser Ready/Processing |
#
ATTACKMODE HID