Standalone post-quantum security auditor suite for remote HTTPS targets.
pqc-audit.py(Python): external Quantum Risk Audit over port 443 with HNDL, Grover, and Shor posture checks.tools/cipher-scan-go/cipher-scan(Go): high-performance TLS protocol and cipher negotiation scanner with worker-pool batching and table/JSON/CSV/HTML output.
pqc-audit.py performs an external Quantum Risk Audit over port 443 only. It does not require local host access, credentials, or agents on the target server.
- Non-blocking TCP and TLS handshake using Python
socketandssl - Certificate parsing with
cryptography.x509 - CLI interface with
click - Barbell strategy checks:
- Safe anchor: TLS hygiene checks
- Certificate expiry
- Revocation metadata signals (OCSP and CRL references)
- TLS 1.0 and TLS 1.1 acceptance checks
- Spec risk: post-quantum failings
- HNDL risk: flags missing hybrid PQC key exchange signals
- Grover risk: flags AES-128 as MEDIUM and recommends AES-256
- Shor risk: flags RSA below 3072 bits and standard ECC as HIGH
- Safe anchor: TLS hygiene checks
- Structured terminal table with:
- Field
- Current State
- Quantum Status
- Remediation
- Risk band (Immediate, Transition, Long-term)
- JSON output mode for automation and CI pipelines
- Optional TLS trust controls for test environments:
--insecurefor temporary validation bypass--cafilefor custom CA bundle trust
- Python 3.10+
Install dependencies:
pip install -r requirements.txt./pqc-audit.py --url https://example.comOptional flags:
./pqc-audit.py --timeout 8
./pqc-audit.py --json
./pqc-audit.py --skip-legacy-probe
./pqc-audit.py --cafile /path/to/ca-bundle.pem
./pqc-audit.py --insecure
./pqc-audit.py --remediation-guide
./pqc-audit.py --helpQuantum Risk Audit Report
Target: https://example.com
Resolved IP: 104.18.26.120
Port: 443
...
A built-in remediation guide is available in the help flow:
./pqc-audit.py --remediation-guide- The HNDL check relies on negotiated cipher naming heuristics and known PQC hybrid markers.
- Public web PKI currently uses classical signatures, so certificate checks focus on migration risk visibility.
- Results represent a point-in-time external posture of the tested endpoint.
MIT (recommended). Add a LICENSE file if you want explicit licensing.