Cybercorns logo

Cyber

corns

Join the

Cyber

corns

NCSSM Durham's official cybersecurity club for students who want to learn cyber and actually use it.

Weekly optional meetings, hands-on projects, industry connections, and training for competitions like picoCTF.

join the discordinterest form

Details for the first meeting and interest session will be posted on the website.

Cybercorns unicorn logo

What We Do

Hi @everyone! want to learn cybersecurity AND actually use it?

CyberUnicorns is NCSSM Durham's official cybersecurity club, and we're recruiting members for this year.

What we do

  • weekly optional meetings
  • learn cyber with hands-on projects
  • build connections in industry
  • train for and compete in CTFs like picoCTF (and win)

Looking for leadership!

If you show initiative, you're welcome even if you're new to cybersecurity.

Big Opportunity

We have a direct opportunity to work with the National Coast Guard and other organizations and companies, so members can do more than just study challenge writeups.

Competition focus

  • picoCTF categories like web, crypto, reversing, forensics, binary exploitation, and general skills
  • Other team competitions and open events as members level up
  • Real tooling with Linux, Python, Wireshark, netcat, and challenge workflows

Join pathway

Join the Discord, check the interest form, and come to the first meeting or interest session once details are posted.

Club Pathways

Nonprofit

Community cyber education, secure web help for mission-driven groups, and outreach projects that do real public good.

Public Sector

A direct opportunity to work with the National Coast Guard and other partner organizations that want student initiative.

Industry

Connections with security professionals, companies, and practical team experience that helps members build real momentum.

Competition Layout

picoCTF

logo

Developed by Carnegie Mellon, picoCTF is the main competition we use to train new members across web, crypto, reversing, forensics, binary exploitation, and general skills.

What members build toward

  • Hands-on solves, writeups, and challenge workflows
  • Team practice for broader competitions after picoCTF
  • Technical confidence with modern cyber tools and concepts
  • More club material on the CyberUnicorns curriculum

How to Join

All experience levels welcome

Weekly optional meetings and hands-on projects

Build connections in industry

Leadership opportunities for members who show initiative

Train for and compete in CTFs like picoCTF

1

Join the Discord

2

Fill out the interest form and follow the Instagram

3

Come to the first meeting or interest session

Details will be posted on the website

Discord will have updates too

If you want leadership, say so in the form or introduce yourself in Discord.

Topics We Cover

Web

hidden routes, auth bypass, and session flaws

cookies, local storage, JWTs, and OAuth basics

cross-site scripting, sql injection, command injection, and SSRF

api testing with javascript, php, and python tooling

Cryptography

encoding vs encryption and when each matters

classical ciphers like caesar, rot, atbash, and substitution

hashes, signatures, key exchange, and common crypto mistakes

ascii, hex, base64, utf-8, qr codes, and steganography workflows

Reverse Engineering

strings, symbols, and reading decompiled output

ghidra basics and reverse engineering challenge habits

python, android, and binary reversing patterns

Forensics

pcaps, disk artifacts, and memory snapshots

metadata, logs, timelines, and traceable breadcrumbs

osint pivots and fast evidence triage

Binary Exploitation

stack and heap basics, calling conventions, and memory layout

buffer overflows, format strings, and unsafe input handling

pwntools, gdb, and mitigation-aware challenge solving

General Skills

linux commands, ssh, netcat, bash scripting, and vim survival

tcp, udp, sockets, ports, and packet flow intuition

virtual machines, containers, and repeatable lab setup

Cloud & Identity

iam basics, role assumptions, and secret handling

storage exposure, token leaks, and identity mistakes

how cloud thinking shows up in modern web and infra challenges

Tools

python

wireshark

netcat

ghidra


© 2026 CyberUnicorns