diff --git a/Server Side Request Forgery/README.md b/Server Side Request Forgery/README.md
index 485ee53..f522a74 100644
--- a/Server Side Request Forgery/README.md
+++ b/Server Side Request Forgery/README.md
@@ -450,7 +450,7 @@ gopher://127.0.0.1:6379/_save
## SSRF exploiting PDF file
-
+
Example with [WeasyPrint by @nahamsec](https://www.youtube.com/watch?v=t5fB6OZsR6c&feature=emb_title)
@@ -458,6 +458,18 @@ Example with [WeasyPrint by @nahamsec](https://www.youtube.com/watch?v=t5fB6OZsR
```
+Example with PhantomJS
+
+```js
+
+```
+
## Blind SSRF
> When exploiting server-side request forgery, we can often find ourselves in a position where the response cannot be read.