Infiltrator Network Security Scanner icon

Infiltrator Network Security Scanner

1 big stars
Infiltrator Network Security Scanner screenshot
Name: Infiltrator Network Security Scanner
Works on: windowsWindows NT and above
Version: 4.6
Last Updated: 26 Apr 2017
Release: 19 Mar 2014
Category: Desktop Enhancements
Rate this software:
350 downloads
commentsComments
downloadDownload
Liked it? Tell others:
details

Infiltrator Network Security Scanner Details

Works on: Windows 10 | Windows 8.1 | Windows 8 | Windows 7 | Windows XP | Windows 2000 | Windows 2003 | Windows 2008 | Windows 98 | Windows ME | Windows NT | Windows Vista | Windows 2012
SHA1 Hash: 28d487cdc18fce7675ccf1f9303726bf2a145adb
Size: 1.25 MB
File Format: zip
Rating: 1.913043478 out of 5 based on 23 user ratings
Downloads: 350
License: Free
Infiltrator Network Security Scanner is a free software by Infiltration Systems and works on Windows 10, Windows 8.1, Windows 8, Windows 7, Windows XP, Windows 2000, Windows 2003, Windows 2008, Windows 98, Windows ME, Windows NT, Windows Vista, Windows 2012.
You can download Infiltrator Network Security Scanner which is 1.25 MB in size and belongs to the software category Desktop Enhancements.
Infiltrator Network Security Scanner was released on 2014-03-19 and last updated on our database on 2017-04-26 and is currently at version 4.6.
download button
Thank you for downloading from SoftPaz! Your download should start any moment now. It would be great if you could rate and share:
Rate this software:
Share in your network:
features

Infiltrator Network Security Scanner Description

Infiltrator is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations.Infiltrator can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more. It can also audit password and security policies, perform HTTP/CGI server auditing, registry auditing.

In addition, Infiltrator also comes with over 15 network utilities for footprinting, scanning, enumerating, and gaining access to machines (ping sweep, whois lookups, email tracing, share scanning and more). Infiltrator can be run from the commandline, allowing for external scheduling and automated scanning. Infiltrator comes with a built-in database of know vulnerabilities, and allows you to select the items to scan for, or to add custom entries to be included.