PQCAT Documentation

Install, configure, and deploy PQCAT for post-quantum cryptographic compliance assessment. From download to your first scan report in under 5 minutes.

Getting Started

Follow these steps to install PQCAT and run your first compliance assessment.

1

Download PQCAT

PQCAT is a single executable file with no additional software required. Choose your platform below, then download the latest release.

# Step 1: Download the latest release curl -LO https://github.com/soqucoin-labs/pqcat/releases/download/v2.0.1/pqcat-2.0.1-darwin-arm64.tar.gz # Step 2: Extract the binary tar xzf pqcat-2.0.1-darwin-arm64.tar.gz # Step 3: Install to your PATH (rename to 'pqcat') sudo mv pqcat-2.0.1-darwin-arm64 /usr/local/bin/pqcat

For Intel Macs, replace darwin-arm64 with darwin-amd64 in all three steps. Alternatively, download directly from the GitHub Releases page.

# Step 1: Download the latest release curl -LO https://github.com/soqucoin-labs/pqcat/releases/download/v2.0.1/pqcat-2.0.1-linux-amd64.tar.gz # Step 2: Extract the binary tar xzf pqcat-2.0.1-linux-amd64.tar.gz # Step 3: Install to your PATH (rename to 'pqcat') sudo mv pqcat-2.0.1-linux-amd64 /usr/local/bin/pqcat

For ARM servers (e.g. AWS Graviton), replace linux-amd64 with linux-arm64 in all three steps.

# Download from GitHub Releases: https://github.com/soqucoin-labs/pqcat/releases/download/v2.0.1/pqcat-2.0.1-windows-amd64.zip # Extract the .zip and add pqcat.exe to your PATH.

Or download manually from the GitHub Releases page and extract to any folder in your system PATH.

# Requires Go 1.25+ git clone https://github.com/soqucoin-labs/pqcat.git cd pqcat make

This builds the open-source scanner edition. The Pro edition is available as pre-built signed binaries.

2

Verify Installation

Confirm PQCAT is installed correctly by checking the version.

pqcat version
Expected Output PQCAT v2.0.1 (Scanner Edition) Built: 2026-03-18 · Go 1.25 · darwin/arm64
3

Run Your First Scan

PQCAT can scan websites, source code, network ranges, and software inventories. Choose a scan type below to see how it works.

Scan a website or any TLS-enabled endpoint to assess its certificate chain, cipher suites, and signature algorithms.

pqcat scan tls example.com
Sample Output PQCAT Crypto Bill of Health — example.com ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Quantum Readiness Score: 42/100 ● Quantum Vulnerable 12 assets ● Transitional 8 assets ● PQ Compliant 23 assets Top Migration Priority: → RSA-2048 certificates (12 instances)

Point PQCAT at a source code directory to find cryptographic function calls, hardcoded keys, and deprecated algorithm usage across 579 patterns in 39 file types.

pqcat scan code ./my-application/src
Sample Output PQCAT Crypto Bill of Health — ./my-application/src ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Quantum Readiness Score: 31/100 ● Quantum Vulnerable 8 assets ● Transitional 4 assets ● PQ Compliant 2 assets Top Findings: → RSA key generation in auth/crypto.go:142 → ECDSA signing in payments/sign.py:87

Scan an entire network subnet to discover all TLS and SSH endpoints and assess their cryptographic posture.

pqcat scan cidr 10.0.1.0/24
Sample Output PQCAT Crypto Bill of Health — 10.0.1.0/24 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Hosts Discovered: 47 · Endpoints Scanned: 83 Quantum Readiness Score: 58/100 ● Quantum Vulnerable 22 assets ● Transitional 31 assets ● PQ Compliant 30 assets

Analyze a CycloneDX or SPDX software bill of materials to identify cryptographic libraries and their quantum vulnerability status.

pqcat scan sbom ./vendor-sbom.cdx.json
Sample Output PQCAT Crypto Bill of Health — vendor-sbom.cdx.json ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Libraries Analyzed: 214 · Crypto Dependencies: 18 Quantum Readiness Score: 67/100 ● Quantum Vulnerable 3 libraries ● Transitional 6 libraries ● PQ Compliant 9 libraries

PQCAT classifies every discovered cryptographic asset into one of three zones: Quantum Vulnerable (replace immediately), Transitional (plan migration), or PQ Compliant (meets post-quantum standards).

4

Generate a Compliance Report

Create a self-contained HTML report that you can open in any browser and share with your team — no internet connection required to view it.

pqcat scan tls example.com \ --framework fisma \ --html report.html \ --save-db

--framework fisma scores against FISMA compliance requirements. --html report.html generates a visual report file. --save-db stores results for historical comparison.

Open report.html in your browser to see the full Crypto Bill of Health with interactive asset tables, zone breakdowns, and migration recommendations.

Scanner Modules

Seven discovery modules scan every cryptographic asset in your infrastructure.

ModuleCommandDescription
TLS/SSLscan tls <host>Certificate chain, cipher suites, and signature algorithms
SSHscan ssh <host>Key exchange algorithms and host key types
SBOMscan sbom <file>CycloneDX/SPDX crypto dependency analysis (180+ libraries)
PKIscan pki <path>Certificate chain walking and CA analysis
Source Codescan code <dir>Pattern scanning for crypto usage (579 patterns across 39 file types)
HSM/KMSscan hsm <endpoint>Hardware security module key type discovery
Networkscan cidr <range>Subnet-wide TLS/SSH endpoint discovery

CLI Reference

Common flags and commands available across all editions.

FlagDescriptionExample
--frameworkSet compliance framework for scoring--framework fisma
--htmlGenerate self-contained HTML report--html report.html
--save-dbPersist scan results to SQLite database--save-db
--configSpecify configuration file--config /etc/pqcat/pqcat.yaml
--criticalityOverride target criticality level--criticality critical
--threatintelLoad threat intelligence sidecar--threatintel pqcat-intel.json
--outputSet output format--output json

Additional Commands

CommandDescription
serveStart web dashboard and REST API (Pro edition)
dashboardLaunch terminal dashboard (TUI, all editions)
config initGenerate documented configuration template
versionShow version, build, and edition information

Configuration

YAML-based configuration with a 6-level precedence chain.

Precedence (highest → lowest)

1CLI flags (--framework fisma)
2Environment variables (PQCAT_FRAMEWORK)
3Explicit config (--config path)
4Local directory (./pqcat.yaml)
5User home (~/.pqcat/config.yaml)
6System (/etc/pqcat/pqcat.yaml)
# pqcat.yaml — minimal example framework: cnsa2 organization: "My Agency" scanner: workers: 4 timeout: 30s database: path: pqcat.db # Generate full template: # pqcat config init

Supported Frameworks

11 regulatory frameworks assessed in a single scan.

Framework--frameworkSector
CNSA 2.0cnsa2Federal / NSA
NSM-10nsm10Federal
FISMAfismaFederal (NIST 800-53)
FedRAMPfedrampFederal Cloud
SP 800-131Asp800131aFederal
CMMC 2.0cmmcDoD Supply Chain
PCI DSSpciFinancial
SOXsoxFinancial
HIPAAhipaaHealthcare
NYDFS 23 NYCRR 500nydfsFinancial
SWIFT CSPswiftFinancial Messaging

Need Help?

For technical support, licensed customers can email labs@soqu.org. For the open-source scanner, file issues on GitHub.

Request 7-Day Evaluation View on GitHub