Powered by a high-tech graphical user interafce, Infiltrator is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports. It can also audit password and security policies, perform HTTP/CGI server auditing, registry auditing In addition, Infiltrator also comes with 18 network utilities for footprinting, scanning, enumerating, and gaining access to machines (ping sweep, whois lookups, e-mail tracing, share scanning). The program can be run from the commandline, allowing for external scheduling and automated scanning.
10-day trial, report generating disabled
Like it? Share with your friends!
Other Windows Software of Developer «Infiltration Systems»:
NetAware NetAware is a monitoring solution that logs and records all shared file activity on your computer or network. NetAware can log what files users access and what shares they connect to and disconnect from on your file shares. NetAware is a first of its kind
Infiltrator Network Security Scanner Infiltrator is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations.
Infiltrator can reveal and catalog a variety of information, including installed software, shar
MailScan for SMTP Servers MailScan is the advanced Real-time AntiVirus and AntiSpam solution for Mail Servers. MailScan protects organizations network against Virus, Worm, Trojan and many other information security threats. Employing an array of intelligent filters, MailScan offers
Mareew Office Recovery Automatically recover lost and deleted Microsoft Office and OpenOffice documents with Mareew Office Recovery. Survive system crashes and disk corruption, recover documents from formatted or inaccessible disks, and rescue files deleted from the Recycle Bin
Privilege Authority Privilege Authority lets administrators establish what aspects of Windows users can manage without making them local Admins. By defining elevation rules within Privilege Authority, user rights can be set at the appropriate level and users privileges will a
PhotoSeek - Forensic Analysis Tool Proventsure develops software to search computers for sensitive and confidential information based on algorithms used by molecular biologists to map DNA, as well as many custom developed algorithms for decoding files and data to ID information and clusteri
Secure Oracle Auditor Secure Oracle Auditor (SOA) is an Oracle auditing and Oracle security vulnerability assessment software which is capable of scanning multiple Oracle database servers. This Oracle security software provides Oracle audit tools, Oracle password tools, databas
Lobby Track Free Edition Get started today with the new free edition of Lobby Track, Jolly's industry leading visitor management software.
Register and badge visitors -- Register new visitors or other groups of people. Registration steps are configurable and you define what da
Pen Drive Unlocker PenDrive Locker/Unlocker utility is a small, simple yet truly portable program designed to unlock windows registry which prevent someone to use Flash Drive/Mass Storage/External Drive on USB port. This program also suitable for system administrator to limi
Cyberarms Intrusion Detection (64-bit) Cyberarms IDDS makes it easy to block brute force attacks against servers running Remote Desktop, Microsoft Server family (SQL Server, Exchange Server, Outlook Web Access, CRM Server, SharePoint Server) and Websites with Windows user authentication. The so
AccessPatrol (64-bit) AccessPatrol provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, and MP3s) to prevent illicit transfer of data to unauthorized devices. Features include restrict leakage of proprietary data to vuln
Drainware Security Endpoint Drainware is a security service developed to provide control over the sensitive and provide information. It allows to monitor or block any attempt of data loss, and collect all the related information: username, date, computer, location, category and event
Supported Operating Systems:
Windows 2000 |
Windows NT |
Windows XP |
Comments on Infiltrator:
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10