I. Introduction
In the digital age, where the ubiquitous USB flash drive is a common sight in both personal and professional environments, an inconspicuous device known as the “USB Rubber Ducky” has emerged as a potent tool for executing keyboard-based attacks on target computer systems. This tiny device, resembling an innocuous USB flash drive, has the remarkable ability to emulate a keyboard and inject keystrokes into a connected computer at an astonishing rate. While the USB Rubber Ducky serves legitimate purposes, such as security testing and ethical hacking, it has also raised concerns about potential misuse and the exploitation of this technology for malicious intent.