From abe791b9cfd62b59abfdb59e28abb662d59022cf Mon Sep 17 00:00:00 2001 From: Mia Steinkirch <mia.steinkirch@gmail.com> Date: Sun, 27 Oct 2019 20:58:02 -0700 Subject: [PATCH] =?UTF-8?q?=F0=9F=91=A9=F0=9F=8F=BE=20Clean=20up=20readme?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- Rubber_Duck/README.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/Rubber_Duck/README.md b/Rubber_Duck/README.md index a3e0de8..df5fe53 100644 --- a/Rubber_Duck/README.md +++ b/Rubber_Duck/README.md @@ -1,5 +1,4 @@ -Introduction -============ +# Rubber Duck Hacking The [USB Rubber Ducky](https://hakshop.myshopify.com/products/usb-rubber-ducky-deluxe) is an open source Penetration Testing tool for authorized network auditing and security analysis purposes only where permitted subject local and international laws where applicable @@ -47,4 +46,3 @@ Hak5's Introduction __(.)< __(.)> __(.)= Rubber >(.)__ <(.)__ =(.)__ \___) \___) \___) Ducky! (___/ (___/ (___/ -The USB Rubber Ducky is a Human Interface Device programmable with a simple scripting language allowing penetration testers to quickly and easily craft and deploy security auditing payloads that mimic human keyboard input. The source is written in C and requires the AVR Studio 5 IDE from atmel.com/avrstudio. Hardware is commercially available at hakshop.com. Tools and payloads can be found at usbrubberducky.com. Quack!