Powered by a high-tech graphical user interafce, Infiltrator is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports. It can also audit password and security policies, perform HTTP/CGI server auditing, registry auditing In addition, Infiltrator also comes with 18 network utilities for footprinting, scanning, enumerating, and gaining access to machines (ping sweep, whois lookups, e-mail tracing, share scanning). The program can be run from the commandline, allowing for external scheduling and automated scanning.
10-day trial, report generating disabled
Like it? Share with your friends!
Other Windows Software of Developer «Infiltration Systems»:
NetAware NetAware is a monitoring solution that logs and records all shared file activity on your computer or network. NetAware can log what files users access and what shares they connect to and disconnect from on your file shares. NetAware is a first of its kind
Infiltrator Network Security Scanner Infiltrator is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations.
Infiltrator can reveal and catalog a variety of information, including installed software, shar
SysLogIDM2Connector This driver works with Nsure Identity Manager 2 to provide interoperability between Application, Device, Operating System, and Event management Console and Novell eDirectory. It uses extensible markup language (XML) to perform data and event transformation
Windows Security Analyzer This tool runs over 100 tests to gauge server security against best practices. Some tests include explanations and background information. It also calculates entropy and NIST Special Publication 800-63 compliance. The Windows Configuration Security Analyze
System.Persistence This is a ready-to-ship piece of code that makes software development available to the average "power user". It solves the data access layer and is appropriate for over 95% of all business applications in production and development today. It works for an
Astaro Security Gateway An Astaro Security Gateway provides immediate protection for your network, web access and email traffic. The Astaro solution integrates more security applications than any competitor in one award-winning management device. A complete range of hardware appl
SSX Free SSX Free v2.0.1 allows individuals and corporations to extend their Secure Trade Link account services to their Linux based servers. Secure Trade Link provides secure document transfer and digital signature services for businesses. Create contracts online
FactotumNOW Web Checking and Replication Allocate a staging area on your network and replicate the Web files from there onto your Web servers. Operate with several Web servers by replicating one content source to several servers. Only one open port required between staging area and Web servers (T
Keylogger NET4 Information security Keylogger NET4 consists of Spying for users system activity module and Keylogger data Viewer module that can be installed as into the system and on a removable device(USB flash drive). Keylogger NET4 is powered with keyboard spy loggin
Policy Patrol MFT Server Still sending files via courier, FTP or as unsecured email attachments? Policy Patrol MFT allows you to easily send and receive large and confidential files ensuring trackable, instant and secure delivery. Files are automatically encrypted and the recipien
Internet Administrator for Network - Internet Administrator is a software for monitoring internet traffic in networks of any scale! It controls internet access, shows reports, and blocks internet users by many options!
- It is an software-independent solution that allows to organize web f