Q-SCANNER v2.1 — Free PQC Vulnerability Audit

Is your server ready for
quantum threats?

Scan any domain to analyze TLS configuration, cipher suites, certificates, and post-quantum cryptography readiness. Free, open-source, instant results.

https://
Try: google.com · github.com · cloudflare.com
Scanning target...

Quantum Risk Analysis

Evaluates Shor's & Grover's algorithm impact on your key exchange, encryption and certificates.

🔐

TLS Deep Scan

Probes all TLS versions, cipher suites, certificate chain, and HTTP security headers.

🛡

PQC Readiness

Detects ML-KEM (Kyber), ML-DSA (Dilithium) and other NIST post-quantum standards.

Q-AUTOPILOT — SOC Orchestrator

Autonomous Security Operations Center. Q-AUTOPILOT connects all 52 modules into a self-operating security engine that monitors, triages, and responds — 24/7.

🧠

Threat Correlation Engine

Cross-references scanner results, vulnerability feeds, and network telemetry. Correlates events across all modules to detect advanced persistent threats.

Automated Incident Response

Pre-built and custom IR playbooks execute automatically. Isolate endpoints, rotate keys, trigger Q-SHIELD encryption — sub-second response.

📊

Risk Scoring & Prioritization

ML-driven risk scoring aggregates signals from Q-SCANNER, Q-SENTINEL, and Q-RADAR. Prioritizes critical issues by exploitability and blast radius.

🔗

Cross-Module Orchestration

When Q-SCANNER detects a weak cipher, Q-AUTOPILOT triggers Q-CYCLE for key rotation, Q-AUDIT for logging, and Q-CRA for compliance update.

🎯

Adaptive Threat Hunting

Continuously learns from your environment. Refines detection models based on false positive feedback and emerging quantum-era attack patterns.

📋

Compliance Automation

Maps security events to CRA, NIS2, GDPR, ISO 27001 requirements automatically. Generates audit-ready evidence with full decision explainability.

The Q-CORE Platform — 66 Modules

A complete post-quantum cybersecurity stack. From scanning to forensics — everything you need to protect your infrastructure against quantum-era threats.

66 / 66 modules
Core Cryptography
8 modules
Q-01
Q-SHIELD
ML-KEM (Kyber-768) key encapsulation for quantum-safe key exchange. NIST FIPS 203.
Business+
Q-02
Q-SIGN
ML-DSA (Dilithium) digital signatures with ECDSA P-384 fallback. FIPS 204 compliant.
Business+
Q-03
Q-VAULT
AES-256-GCM authenticated encryption with HKDF key derivation. Tamper-evident storage.
Business+
Q-04
Q-GATE
FIDO2/WebAuthn zero-trust authentication. Hardware token MFA, phishing-resistant.
Business+
Q-05
Q-HSM
TPM 2.0 / PKCS#11 hardware security module interface. Hardware-bound key storage.
Enterprise+
Q-06
Q-CYCLE
Automated key lifecycle — rotation, re-encryption, revocation. Plaintext never on disk.
Enterprise+
Q-07
Q-HYBRID
Hybrid classical+PQC encryption. Dual-layer protection during quantum transition period.
Business+
Q-08
Q-ENTROPY
Quantum-grade random number generation. NIST SP 800-90B entropy source validation.
Business+
Scanning & Compliance
7 modules
Q-09
Q-SCANNER
TLS/PQC vulnerability scanner. 9 scan areas, 117 tests, quantum risk scoring.
Free
Q-10
Q-CRA
EU Cyber Resilience Act compliance dashboard. Automated reports, gap analysis, NIS2 mapping.
Business+
Q-11
Q-AUDIT
Hash-chained tamper-evident audit trail. FIPS-ready compliance logging for all crypto ops.
Business+
Q-12
Q-COMPLY
Multi-framework compliance engine — ISO 27001, SOC 2, GDPR, HIPAA, PCI DSS mapping.
Business+
Q-13
Q-POLICY
Auto-generate security policies from scan results and regulatory requirements.
Business+
Q-14
Q-RADAR
Regulatory change monitoring. AI-tracked updates to CRA, NIS2, DORA with impact analysis.
Enterprise+
Q-15
Q-BENCH
CIS Benchmark automated assessment. Infrastructure hardening validation and scoring.
Business+
AI-Powered Security
6 modules
Q-16
Q-AUTOPILOT
SOC orchestrator. Autonomous threat correlation, IR playbooks, cross-module response.
Business+
Q-17
Q-SENTINEL
AI behavioral anomaly detection. ML models trained on network baselines detect zero-days.
Business+
Q-18
Q-PREDICT
Threat prediction engine. Forecasts attack vectors based on CVE trends and threat intel.
Enterprise+
Q-19
Q-CLASSIFY
Automated data classification. Identifies PII, secrets, and sensitive data across repos.
Business+
Q-20
Q-DECEPTION
AI-managed honeypots and decoy systems. Lure attackers, gather TTPs, alert on intrusion.
Enterprise+
Q-21
Q-INTEL
Threat intelligence aggregation. IOC feeds, STIX/TAXII, dark web monitoring integration.
Business+
Advanced Cryptography
5 modules
Q-22
Q-CERT
X.509 certificate lifecycle management. Issuance, renewal, revocation, CT log monitoring.
Business+
Q-23
Q-PKI
Private PKI infrastructure. Internal CA, certificate templates, OCSP responder.
Enterprise+
Q-24
Q-TOKEN
Cryptographic tokenization. Replace sensitive data with tokens while preserving format.
Business+
Q-25
Q-SEAL
Code signing and firmware verification. Tamper-evident software supply chain integrity.
Business+
Q-26
Q-MIGRATE
PQC migration toolkit. Crypto inventory, algorithm replacement planner, transition roadmap.
Enterprise+
Network Defense
6 modules
Q-27
Q-FIREWALL
Next-gen application firewall with DPI, protocol analysis, and ML threat detection.
Business+
Q-28
Q-MESH
Zero-trust service mesh. mTLS everywhere, micro-segmentation, identity-based access.
Enterprise+
Q-29
Q-DNS
Secure DNS with DNSSEC validation, DoH/DoT, DNS-based threat blocking.
Business+
Q-30
Q-PROXY
TLS-intercepting forward proxy. Content inspection, DLP, and PQC protocol enforcement.
Enterprise+
Q-31
Q-VPN
Post-quantum VPN tunnel. WireGuard-based with ML-KEM key exchange layer.
Business+
Q-32
Q-ENDPOINT
Endpoint detection and response. Behavioral analysis, process isolation, auto-quarantine.
Business+
Forensics & Incident Response
5 modules
Q-33
Q-FORENSIC
Digital forensics toolkit. Memory dumps, disk imaging, artifact extraction with chain-of-custody.
Enterprise+
Q-34
Q-LOG
Centralized SIEM. Log aggregation, correlation rules, ML anomaly detection across all sources.
Business+
Q-35
Q-PLAYBOOK
IR playbook engine. SOAR-style automated response with human-in-the-loop escalation.
Business+
Q-36
Q-TRACE
Attack path reconstruction. Visualizes lateral movement, timeline, and IOC correlation.
Enterprise+
Q-37
Q-RECOVER
Disaster recovery orchestrator. Automated backup verification, failover, and restoration.
Enterprise+
Security Operations
5 modules
Q-38
Q-ASSET
IT asset discovery and inventory. Auto-detect endpoints, services, certificates, keys.
Business+
Q-39
Q-PATCH
Vulnerability patch management. CVE tracking, auto-prioritization, deployment orchestration.
Business+
Q-40
Q-LICENSE
Ed25519-signed enterprise licensing. Feature toggling, expiration, HMAC anti-tampering.
Enterprise+
Q-41
Q-CONFIG
Security configuration management. Baseline enforcement, drift detection, auto-remediation.
Business+
Q-42
Q-PIPELINE
Secure CI/CD pipeline. SAST/DAST integration, dependency scanning, build attestation.
Business+
Governance & Risk
5 modules
Q-43
Q-RISK
Quantitative risk assessment. FAIR methodology, loss exposure modeling, board-ready reports.
Business+
Q-44
Q-VENDOR
Third-party risk management. Vendor security questionnaires, continuous monitoring, scoring.
Business+
Q-45
Q-PRIVACY
Data privacy engine. DSAR automation, consent management, data mapping, breach notification.
Business+
Q-46
Q-ACCESS
Identity & access governance. Role mining, access reviews, privilege escalation detection.
Enterprise+
Q-47
Q-BCP
Business continuity planning. Impact analysis, recovery strategies, tabletop exercise automation.
Enterprise+
Education & Planning
5 modules
Q-48
Q-ACADEMY
PQC education platform. 6 interactive modules: Y2Q, CRA, NIST FIPS 203/204. Certification.
Free
Q-49
Q-BRIDGE
Academy Bridge. Maps scanner findings to lessons. Personalized Scan → Learn → Fix cycle.
Business+
Q-50
Q-SIMULATE
Attack simulation platform. Quantum attack scenarios, red team exercises, tabletop drills.
Enterprise+
Q-51
Q-ROADMAP
PQC migration roadmap generator. Timeline, milestones, resource planning for quantum transition.
Business+
Q-52
Q-REPORT
Executive reporting engine. Board-ready security posture reports with trend analysis and benchmarks.
Business+

🇪🇺 CRA Compliance Dashboard

Track your EU Cyber Resilience Act compliance in real-time. Automated reports, gap analysis, NIS2 mapping, multilingual PDF export (EN/CS/DE).

Open CRA Dashboard →
Zákon č. 264/2025 Sb. — účinný od 1.11.2025

🇨🇿 Český ZKB & NIS2
Compliance pro firmy

Nový zákon o kybernetické bezpečnosti se týká 6 000+ českých organizací. Pokuta za nesplnění: až 250 mil. Kč nebo 2 % z obratu. Q-CRA Dashboard vám pomůže splnit všechny požadavky.

6 000+
regulovaných firem
250M
Kč maximální pokuta
98%
Q-CORE compliance score
18
§ paragrafů ZKB pokryto
📋

ZKB § Mapování

Kompletní mapování vašich systémů na 18 paragrafů zákona č. 264/2025 Sb. Každý požadavek propojený s konkrétním Q-CORE modulem a NIS2 článkem.

🚨

Hlášení incidentů pro NÚKIB

Předpřipravené formuláře 24h / 72h / 30d podle § 15 a § 16 ZKB. Vyplníte, stáhnete PDF a odešlete přes Portál NÚKIB.

📊

Sovereign Compliance Score

Skóre 0–100 % v reálném čase. Vidíte přesně jak jste na tom se zákonem. Detailní rozpis po oblastech.

🔍

Gap Analysis

Přesný checklist co splňujete a co vám chybí k 100% shodě. Ke každé mezeře konkrétní doporučení.

🏢

Samoidentifikace

Kalkulačka podle vyhlášky č. 408/2025 Sb. Zadáte odvětví a velikost firmy — okamžitě víte jestli spadáte pod zákon.

📄

PDF reporty CZ / DE / EN

Profesionální compliance reporty v češtině, němčině a angličtině. Digitálně podepsané. Připravené pro audit NÚKIB.

Spadáte pod nový zákon o kybernetické bezpečnosti?

Zjistěte to za 30 sekund. Zkontrolujte svou firmu a začněte s compliance ještě dnes.

Otevřít CRA Dashboard → Portál NÚKIB ↗

Choose Your Protection Level

From SME essentials to sovereign-grade defense. All packages include Q-SCANNER. Prices on request.

Starter
Starter
5 modules · Price on request
For small businesses taking their first quantum-safe step.
  • Q-AUTOPILOT — AI orchestrator
  • Q-SHIELD — PQC encryption
  • Q-GATE — Zero-trust access
  • Q-SUPPLY — Supply chain
  • Q-RANSOM — Ransomware defense
  • Q-SCANNER — Free included
info@qcore.systems
Enterprise
Enterprise
20 modules · Price on request
For banks, hospitals and corporations — full deception layer.
  • Everything in Business
  • Q-MIRAGE — Honeypot network
  • Q-ECHO — Deepfake detection
  • Q-TEMPEST — EM shield
  • Q-MIDAS — Financial warfare
  • Q-NEXUS — Quantum comms
  • Q-SENTINEL — AI vs AI combat
  • Q-PROVENANCE — C2PA auth
  • Q-GENOME — DNA backup
  • On-premise deployment
info@qcore.systems
⚔ Sovereign
Sovereign
33 modules · Authorization required
For governments & defense. Strategic frameworks, kinetic-layer modules.
  • Everything in Enterprise
  • Q-AETHER
  • Q-STRIKE
  • Q-DOMINANCE
  • Q-ORBITAL
  • Q-CHRONOS
  • Q-ABYSS
  • Q-SYNAPSE
  • Q-GAIA
  • Q-vCISO
  • Q-ELECTION
  • Q-AIRGAP
  • Q-modules on request
    Government / defense verification required
info@qcore.systems

About Q-CORE Systems

Q-CORE Systems is a cybersecurity company focused on post-quantum cryptography. We build tools that help organizations understand and prepare for the quantum computing era — from free scanning to full enterprise PQC migration.

Our mission: make post-quantum security accessible — before it's too late.

66
Modules
9
Categories
117
Scan Tests
FIPS
Compliant

Ready to go quantum-safe?

Whether you need a free scan or a full enterprise PQC migration — we're here to help.

info@qcore.systems View on GitHub → in — LinkedIn