This is an old revision of the document!
Testing of HTTPS sites
Exploiting XSS with 20 characters limitation
Mapping OWASP Top 10 (2010) against OWASP Testing Guide 3.0
SQL Injection (SQLi)
Web Vulnerability Assessment Methodologies