From abe791b9cfd62b59abfdb59e28abb662d59022cf Mon Sep 17 00:00:00 2001
From: Mia Steinkirch <mia.steinkirch@gmail.com>
Date: Sun, 27 Oct 2019 20:58:02 -0700
Subject: [PATCH] =?UTF-8?q?=F0=9F=91=A9=F0=9F=8F=BE=20Clean=20up=20readme?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

---
 Rubber_Duck/README.md | 4 +---
 1 file changed, 1 insertion(+), 3 deletions(-)

diff --git a/Rubber_Duck/README.md b/Rubber_Duck/README.md
index a3e0de8..df5fe53 100644
--- a/Rubber_Duck/README.md
+++ b/Rubber_Duck/README.md
@@ -1,5 +1,4 @@
-Introduction
-============
+# Rubber Duck Hacking
 
 The [USB Rubber Ducky](https://hakshop.myshopify.com/products/usb-rubber-ducky-deluxe) is an open source Penetration Testing tool for authorized network auditing and security analysis purposes only where permitted subject local and international laws where applicable
 
@@ -47,4 +46,3 @@ Hak5's Introduction
    __(.)< __(.)> __(.)=   Rubber   >(.)__ <(.)__ =(.)__
    \___)  \___)  \___)    Ducky!    (___/  (___/  (___/
 
-The USB Rubber Ducky is a Human Interface Device programmable with a simple scripting language allowing penetration testers to quickly and easily craft and deploy security auditing payloads that mimic human keyboard input. The source is written in C and requires the AVR Studio 5 IDE from atmel.com/avrstudio. Hardware is commercially available at hakshop.com. Tools and payloads can be found at usbrubberducky.com. Quack!