PQCAT scans your infrastructure for quantum-vulnerable cryptography, scores your compliance against CNSA 2.0, NIST SP 800-131A, and 11 regulatory frameworks — then proves it with evidence your auditors will accept.
curl -sSL https://install.pqcat.io | sh
irm https://install.pqcat.io/windows | iex
Every scan module produces a normalized 0–100 compliance score, CBOM inventory, and actionable remediation plan.
Deep inspection of every certificate in the chain. Identifies RSA, ECDSA, and Ed25519 keys vulnerable to Shor's algorithm.
Regex + AST scanning across 40+ languages. Finds hardcoded keys, weak algorithms, and deprecated crypto patterns in your repos.
Parses CycloneDX and SPDX BOMs. Cross-references 2,400+ library signatures against known quantum-vulnerable dependencies.
Scans entire subnets. Discovers SSH, TLS, IPsec, and DNS endpoints. Maps every cryptographic asset on your network perimeter.
Inventories authorized_keys, server host keys, and key exchange algorithms. Flags DSA, RSA-1024, and ECDSA keys for rotation.
Crawls certificate stores, Java keystores, and PEM directories. Full chain validation with quantum-risk classification per asset.
Every scan maps findings to your regulatory obligations. One command, one score, one report your auditor signs off on.
Both are single static binaries. No Docker, no Java, no Python runtime, no shared libraries. Copy it, run it.