
NOTE:- RadareEye Owner will be not responsible if any user performs malicious activities using this tool. Use it for Learning purposes only.
-
Installation of RadareEye :
git clone https://github.com/souravbaghz/RadareEye
Usage:
./radare <mac_addr> <option>
Available Options Are:
- -blue Bluetooth RadareEye
- -ble BLE radareEye
- -wifi Wifi AP radareEye
-
Running Bluetooth RadareEye:
sudo bash radare XX:XX:XX:XX:XX:XX -blue
-
Running BLE RadareEye:
sudo bash radare XX:XX:XX:XX:XX:XX -ble
Same for the Wifi also with -wifi option, Here XX:XX:XX:XX:XX:XX means your target device's MAC Address & make sure to do with sudo (if you aren't rooted). I didn't add a scanning feature in this script but you can get the MAC Address easily by executing 'hcitool scan' for Bluetooth and 'hcitool lescan' for BLE Devices in the terminal.
After running RadareEye, It will ask you 'Command you want to trigger?', you can skip it by simply keeping it blank and it RadareEye will show you the status of your target whether it's in range or not without triggering any command. If you want to trigger any command when your target comes in-between range then enter a command when it asks. Examples:
-
Below given command will shutdown our system immediately when the target device comes in range.
[+]Command you want to trigger? :shutdown now
-
It will run your other script
[+]Command you want to trigger? :./myscript.py
About the Author
Gagan Bagh
Pentester | Web & IOT Security | Co-lead of CCID Department at RESETHACKER.
I have been learning Ethical Hacking/Cybersecurity since 2017 and currently working at Bug Bounty Hunting as Independent Researcher.
LinkedIn: https://www.linkedin.com/in/gagan-bagh-1674a1188/
Author

Latest Articles
Blog2022.05.02Lupo - Malware IOC Extractor and Debugging module for Malware Analysis Automation
Blog2022.05.02DDexec - a technique to run binaries filelessly and stealthily on Linux using dd to replace the shell with another process
Blog2022.04.28ADReaper - A fast enumeration tool for Windows Active Directory Pentesting written in Go
Blog2022.04.27Shhhloader - SysWhispers Shellcode Loader