NCSSM Durham's official cybersecurity club for students who want to learn cyber and actually use it.
Weekly optional meetings, hands-on projects, industry connections, and training for competitions like picoCTF.
Details for the first meeting and interest session will be posted on the website.
Hi @everyone! want to learn cybersecurity AND actually use it?
CyberUnicorns is NCSSM Durham's official cybersecurity club, and we're recruiting members for this year.
What we do
Looking for leadership!
If you show initiative, you're welcome even if you're new to cybersecurity.
We have a direct opportunity to work with the National Coast Guard and other organizations and companies, so members can do more than just study challenge writeups.
Competition focus
Join pathway
Join the Discord, check the interest form, and come to the first meeting or interest session once details are posted.
Nonprofit
Community cyber education, secure web help for mission-driven groups, and outreach projects that do real public good.
Public Sector
A direct opportunity to work with the National Coast Guard and other partner organizations that want student initiative.
Industry
Connections with security professionals, companies, and practical team experience that helps members build real momentum.
picoCTF

Developed by Carnegie Mellon, picoCTF is the main competition we use to train new members across web, crypto, reversing, forensics, binary exploitation, and general skills.
What members build toward
All experience levels welcome
Weekly optional meetings and hands-on projects
Build connections in industry
Leadership opportunities for members who show initiative
Train for and compete in CTFs like picoCTF
Join the Discord
Fill out the interest form and follow the Instagram
Come to the first meeting or interest session
Details will be posted on the website
Discord will have updates too
If you want leadership, say so in the form or introduce yourself in Discord.
hidden routes, auth bypass, and session flaws
cookies, local storage, JWTs, and OAuth basics
cross-site scripting, sql injection, command injection, and SSRF
api testing with javascript, php, and python tooling
encoding vs encryption and when each matters
classical ciphers like caesar, rot, atbash, and substitution
hashes, signatures, key exchange, and common crypto mistakes
ascii, hex, base64, utf-8, qr codes, and steganography workflows
strings, symbols, and reading decompiled output
ghidra basics and reverse engineering challenge habits
python, android, and binary reversing patterns
pcaps, disk artifacts, and memory snapshots
metadata, logs, timelines, and traceable breadcrumbs
osint pivots and fast evidence triage
stack and heap basics, calling conventions, and memory layout
buffer overflows, format strings, and unsafe input handling
pwntools, gdb, and mitigation-aware challenge solving
linux commands, ssh, netcat, bash scripting, and vim survival
tcp, udp, sockets, ports, and packet flow intuition
virtual machines, containers, and repeatable lab setup
iam basics, role assumptions, and secret handling
storage exposure, token leaks, and identity mistakes
how cloud thinking shows up in modern web and infra challenges
python
wireshark
netcat
ghidra