Network & comms
 » Network information & monitoring
Sections : Network & comms > Network information & monitoring
Poor visitors rating
Click to RATE : OneTwoThreeFourFive
Buy Free Infiltrator Network Security Scanner download

Infiltrator Network Security Scanner 4.6

Infiltrator is a powerful Network Security Scanning and Auditing Suite



Infiltrator Network Security Scanner 4.6 facilities

PO BOX 331
55066 Red Wing
Vendor`s Web
Infiltration Systems webshot
OSWindows 98, Windows 2000, Windows XP, Windows Vista, Windows 7, 64-bit (x86_64)
LimitationsInstall and Uninstall
Actualizedmore than year ago
SnapshotInfiltrator Network Security Scanner snapshot
Snapshot of Infiltrator Network Security Scanner

Use this security logo:

100% SAFE logo

Infiltrator Network Security Scanner manufacturer description

Infiltrator is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more. It can also audit password and security policies, perform HTTP/CGI server auditing, registry auditing In addition, Infiltrator also comes with 19 network utilities for footprinting, scanning, enumerating and gaining access to machines (ping sweep, whois lookups, email tracing, share scanning and more). The program can be run from the commandline, allowing for external scheduling and automated scanning.
free download Infiltrator Network Security Scanner 4.6QUICK DOWNLOAD
Free download Infiltrator Network Security Scanner 4.6
Free softwareFREE SOFTWARE

Freeware is computer software that is available for use at no cost or for an optional fee.


Infiltrator Network Security Scanner video tutorials

Tutorial not found. Let know us about any useful video tutorial.

Infiltrator Network Security Scanner categories

Network Scanner, Infiltrator, Auditing, Network Auditing, Security

What is new in 4.6 changeinfo log

New Release

Given stickers for Infiltrator Network Security Scanner & download buttons

NOTE: move cursor over buttons to get html sources.
This award means that Infiltrator Network Security Scanner is an Editor's pick.
Clean award guarantees that Infiltrator Network Security Scanner was tested by antivirus program and is absolutely clean, which means it does not contain any form of malware, including computer viruses, adware, trojans, spyware, rootkits, badware and other malicious and unwanted software.
Report view - CLEAN » ZIP » Setup.exe - CLEAN » ZIP » readme!.txt - CLEAN » ZIP » Visit Infiltrator's Web Home.url - CLEAN » ZIP » Infiltrator Help Manual.url - CLEAN
Get from
Get from
Do you like Infiltrator Network Security Scanner ? Move mouse cursor over the buttons and just copy one of those links, paste the code you copied right where you want on your blog or website.

Infiltrator Network Security Scanner permissions

Our products may NOT be sold or distributed in any way without prior written consent from Infiltration Systems.

End user agreement for Infiltrator Network Security Scanner


1. You may use the program on a single computer at one time. You may not copy the program and accompanying materials except for backup purposes to use in support of using the program on a single machine at one time.

2. You may only install this software on a computer that you own, or on a computer from which you have consent of the owner to install this software.

3. You may not make copies of the program for sale or distribution.

4. This software is copyrighted, and all rights therein are reserved for Infiltration Systems. Purchase of this product does not transfer any right, title, or interest in the software except as specifically set forth in this agreement. You are hereby notified that the software product is protected by United States Copyright Law, and you may be held responsible by Infiltration Systems for any infringement of such rights or violations to this agreement.

5. This license is effective until terminated. You may terminate it at any time by destroying the program and all copies of it. It will also terminate if you fail to comply with any term or condition on this agreement. You agree upon termination to destroy the program together with all copies of the program.

Warranty: This program is provided "as is" without warrantee of any kind, either expressed or implied, including any warranty of merchant ability or fitness for a particular purpose. In no event shall Infiltration Systems be held liable for any loss of profit, special, incidental, consequential, or other similar claims.


All our products are distributed and licensed on an "as is" basis and no warranties or guarantees of any kind are promised by Infiltration Systems as to their performance, reliability or suitability to any given task. In no event shall Infiltration Systems be liable for any loss of data or ANY DAMAGES OF ANY KIND, financial, physical, emotional or other, which might arise from its use.

Our products may NOT be sold or distributed in any way without prior written consent from Infiltration Systems.

All sales of our products are final. No refunds will be issued, guaranteed or promised. Once we issue a registered copy there is no way for us to recall, or rescind a registered program that has already been issued to a customer. Essentially, once the program has been issued there is no way for us to guarantee that a customer has not, or is not continuing to use the product.

It is company policy that our customer databases remain confidential and private. We have not, will not, and won't ever sell names to "spammers" or other parties who would like to use our databases to advertise or solicit their products or services. Infiltration Systems products do not collect any information from your system other than the information required for the products successful operation. Your private information is safe with us.

It is the policy of Infiltration Systems to offer free E-mail based technical support to all of our registered and unregistered customers. We will filter support requests for all non-freeware products of Infiltration Systems from unregistered users.

Infiltration Systems will take legal action against any users that are found to be pirating Infiltration Systems products. In addition, Infiltration Systems will report any users found pirating other products to the products developer or care-keeper.

By using any Infiltration Systems product you agree not to decompile, reverse engineer, modify or change any part of it for the reasons of discovering its internal methods or works. To do so is a violation of Infiltration Systems's copyright protection.

All graphics, software, code samples, and other digital information contained on this web site, as well as software distributed over the Internet are copyright protected and owned by Infiltration Systems. Should you wish to use any site content, be it text information, code samples, or what have you, please contact us for permission.

By installing, running, or using any Infiltration Systems product or service you agree to the above Policies. In addition you agree that you will follow the Infiltration Systems Policies at all times when using a Infiltration Systems product or service.