Rubber Ducky is a cybersecurity awareness project designed to highlight the risks associated with USB devices, including ransomware, backdoors, and keyloggers. This repository provides educational resources, code samples, and demonstration scripts to teach users about potential threats and effective security measures against USB-based attacks.
- Ransomware Awareness: Understand how ransomware can be delivered through USB devices and learn preventive measures.
- Backdoor Detection: Examples of backdoor installations via USB, along with detection strategies.
- Keylogger Prevention: Learn how USB devices can install keyloggers and how to secure against them.
- Ethical Hacking Demos: White-hat methods for USB scanning and threat detection.
To get started, clone the repository using the following command:
git clone https://github.com/AyhamAsfoor/RubberDucky.git
cd RubberDucky
If there is a requirements.txt file with dependencies, install them using:
pip install -r requirements.txt
- Explore the various folders for examples, documentation, and scripts related to USB security.
- Each folder contains README files with detailed explanations for each topic.
RubberDucky/
│
├── README.md # Project overview and setup instructions
├── requirements.txt # List of dependencies
├── docs/ # Documentation on USB threats
├── scripts/ # Code samples and security scripts
└── examples/ # Educational resources and sample attacks
Contributions are welcome! Please follow these steps:
- Fork the repository
git fork https://github.com/your-username/RubberDucky.git
- Create a new branch for your feature
git checkout -b main
- Commit and push your changes
git add . git commit -m "Add your message" git push origin feature-name
Submit a pull request for review.
This project is licensed under the MIT License
. See LICENSE for more details.