Infiltrator is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations.
Infiltrator can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more. It can also audit password and security policies, perform HTTP/CGI server auditing, registry auditing.
In addition, Infiltrator also comes with over 15 network utilities for footprinting, scanning, enumerating, and gaining access to machines (ping sweep, whois lookups, email tracing, share scanning and more). Infiltrator can be run from the commandline, allowing for external scheduling and automated scanning. Infiltrator comes with a built-in database of know vulnerabilities, and allows you to select the items to scan for, or to add custom entries to be included.