Hacking

Contest

Determine if your computer is hacked

Exploiting XSS with 20 characters limitation

SQL Injection (SQLi)

Testing of HTTPS sites

Web Vulnerability Assessment Methodologies