PQCAT Documentation
Install, configure, and deploy PQCAT for post-quantum cryptographic compliance assessment. From download to your first scan report in under 5 minutes.
Getting Started
Follow these steps to install PQCAT and run your first compliance assessment.
Download PQCAT
PQCAT is a single executable file with no additional software required. Choose your platform below, then download the latest release.
For Intel Macs, replace darwin-arm64
with darwin-amd64 in all three steps.
Alternatively, download directly from the
GitHub Releases page.
For ARM servers (e.g. AWS Graviton), replace linux-amd64
with linux-arm64 in all three steps.
Or download manually from the GitHub Releases page and extract to any folder in your system PATH.
This builds the open-source scanner edition. The Pro edition is available as pre-built signed binaries.
Verify Installation
Confirm PQCAT is installed correctly by checking the version.
Run Your First Scan
PQCAT can scan websites, source code, network ranges, and software inventories. Choose a scan type below to see how it works.
Scan a website or any TLS-enabled endpoint to assess its certificate chain, cipher suites, and signature algorithms.
Point PQCAT at a source code directory to find cryptographic function calls, hardcoded keys, and deprecated algorithm usage across 579 patterns in 39 file types.
Scan an entire network subnet to discover all TLS and SSH endpoints and assess their cryptographic posture.
Analyze a CycloneDX or SPDX software bill of materials to identify cryptographic libraries and their quantum vulnerability status.
PQCAT classifies every discovered cryptographic asset into one of three zones: Quantum Vulnerable (replace immediately), Transitional (plan migration), or PQ Compliant (meets post-quantum standards).
Generate a Compliance Report
Create a self-contained HTML report that you can open in any browser and share with your team — no internet connection required to view it.
--framework fisma
scores against FISMA compliance requirements.
--html report.html
generates a visual report file.
--save-db
stores results for historical comparison.
Open report.html
in your browser to see the full Crypto Bill of Health with interactive asset tables,
zone breakdowns, and migration recommendations.
Scanner Modules
Seven discovery modules scan every cryptographic asset in your infrastructure.
| Module | Command | Description |
|---|---|---|
| TLS/SSL | scan tls <host> | Certificate chain, cipher suites, and signature algorithms |
| SSH | scan ssh <host> | Key exchange algorithms and host key types |
| SBOM | scan sbom <file> | CycloneDX/SPDX crypto dependency analysis (180+ libraries) |
| PKI | scan pki <path> | Certificate chain walking and CA analysis |
| Source Code | scan code <dir> | Pattern scanning for crypto usage (579 patterns across 39 file types) |
| HSM/KMS | scan hsm <endpoint> | Hardware security module key type discovery |
| Network | scan cidr <range> | Subnet-wide TLS/SSH endpoint discovery |
CLI Reference
Common flags and commands available across all editions.
| Flag | Description | Example |
|---|---|---|
| --framework | Set compliance framework for scoring | --framework fisma |
| --html | Generate self-contained HTML report | --html report.html |
| --save-db | Persist scan results to SQLite database | --save-db |
| --config | Specify configuration file | --config /etc/pqcat/pqcat.yaml |
| --criticality | Override target criticality level | --criticality critical |
| --threatintel | Load threat intelligence sidecar | --threatintel pqcat-intel.json |
| --output | Set output format | --output json |
Additional Commands
| Command | Description |
|---|---|
| serve | Start web dashboard and REST API (Pro edition) |
| dashboard | Launch terminal dashboard (TUI, all editions) |
| config init | Generate documented configuration template |
| version | Show version, build, and edition information |
Configuration
YAML-based configuration with a 6-level precedence chain.
Precedence (highest → lowest)
| 1 | CLI flags (--framework fisma) |
| 2 | Environment variables (PQCAT_FRAMEWORK) |
| 3 | Explicit config (--config path) |
| 4 | Local directory (./pqcat.yaml) |
| 5 | User home (~/.pqcat/config.yaml) |
| 6 | System (/etc/pqcat/pqcat.yaml) |
Supported Frameworks
11 regulatory frameworks assessed in a single scan.
| Framework | --framework | Sector |
|---|---|---|
| CNSA 2.0 | cnsa2 | Federal / NSA |
| NSM-10 | nsm10 | Federal |
| FISMA | fisma | Federal (NIST 800-53) |
| FedRAMP | fedramp | Federal Cloud |
| SP 800-131A | sp800131a | Federal |
| CMMC 2.0 | cmmc | DoD Supply Chain |
| PCI DSS | pci | Financial |
| SOX | sox | Financial |
| HIPAA | hipaa | Healthcare |
| NYDFS 23 NYCRR 500 | nydfs | Financial |
| SWIFT CSP | swift | Financial Messaging |
Reference Documentation
Complete technical documentation is maintained on GitHub alongside the source code.
Need Help?
For technical support, licensed customers can email labs@soqu.org. For the open-source scanner, file issues on GitHub.