Editors' Note: The Download Now link will download a small installer file to your desktop. Remain online and double-click the installer to proceed with the actual download.
In addition, Infiltrator also comes with over 15 network utilities for footprinting, scanning, enumerating, and gaining access to machines (ping sweep, whois lookups, email tracing, share scanning and more). Infiltrator can be run from the commandline, allowing for external scheduling and automated scanning. Infiltrator comes with a built-in database of know vulnerabilities, and allows you to select the items to scan for, or to add custom entries to be included.