Infiltrator Network Security Scanner can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations.

It comes with a built-in database of known vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included.

Infiltrator can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more.

It can also audit password and security policies, perform HTTP/CGI server auditing, registry auditing In addition, Infiltrator also comes with 19 network utilities for footprinting, scanning, enumerating and gaining access to machines (ping sweep, whois lookups, email tracing, share scanning and more).

You can run Infiltrator Network Security Scanner from the commandline, if you want to use functions like external schedules or automated scan.