PQCAT scans your infrastructure for quantum-vulnerable cryptography, scores your compliance against CNSA 2.0, NIST SP 800-131A, and 11 regulatory frameworks — then proves it with evidence your auditors will accept.
curl -sSL https://install.pqcat.io | sh
irm https://install.pqcat.io/windows | iex
Every scan module produces a normalized 0–100 compliance score, CBOM inventory, and actionable remediation plan.
SSL Labs-grade assessment: full cipher suite enumeration, protocol probing (TLS 1.0–1.3, SSLv3, SSLv2), certificate chain analysis, ML-KEM detection, and quantum-risk classification — 90× faster.
Regex + AST scanning across 40+ languages. Finds hardcoded keys, weak algorithms, and deprecated crypto patterns in your repos.
Parses CycloneDX and SPDX BOMs. Cross-references 183 library signatures against known quantum-vulnerable dependencies.
Scans entire subnets. Discovers SSH, TLS, IPsec, and DNS endpoints. Maps every cryptographic asset on your network perimeter.
Scans nginx, Apache, OpenSSL, and SSH configuration files for weak cipher selections, deprecated protocols, and non-compliant crypto settings.
Inventories authorized_keys, server host keys, and key exchange algorithms. Flags DSA, RSA-1024, and ECDSA keys for rotation.
Crawls certificate stores, Java keystores, and PEM directories. Full chain validation with quantum-risk classification per asset.
Ingests SCAP/XCCDF benchmark results and cross-references crypto policy findings against quantum readiness requirements.
Scans Docker and OCI container images for embedded cryptographic libraries, certificates, and key material with quantum-vulnerability classification.
Every scan maps findings to your regulatory obligations. One command, one score, one report your auditor signs off on.
Single static binaries. No Docker, no Java, no Python runtime, no shared libraries. Copy it, run it.