Showing 6 open source projects for "command line client"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
    Learn More
  • 1
    Learning Bitcoin from the Command Line

    Learning Bitcoin from the Command Line

    A complete course for learning Bitcoin programming and usage

    Learning Bitcoin from the Command Line is a tutorial for working with Bitcoin (and Lightning) that teaches direct interaction with the servers themselves, as the most robust and secure way to begin cryptocurrency work. This is a draft in progress, so that I can get some feedback from early reviewers. It is not yet ready for use. Learning Bitcoin from the Command Line is a project of Blockchain Commons.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    bitcoinj

    bitcoinj

    A library for working with Bitcoin

    bitcoinj is a library for working with the Bitcoin protocol. It can maintain a wallet, send/receive transactions without needing a local copy of Bitcoin Core and has many other advanced features. It's implemented in Java but can be used from any JVM compatible language, examples in Python and JavaScript are included. Highly optimized lightweight simplified payment verification (SPV) mode. In this mode, only a small part of the blockchain is downloaded, making bitcoin suitable for usage on...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    c-lightning

    c-lightning

    BOLT-compliant Lightning Network implementation

    ...This allows low cost, near-instant payments to be trustlessly routed across the network via connected nodes. On top of complying with all BOLT standards, c-lightning is developing an architecture for plugins. Plugins can be built to extend the c-lightning command line API. There are a number of developer tools, libraries and plugins that exist for the c-lightning implementation.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    unMinable

    unMinable

    unMinable is a command-line based cryptocurrency mining tool

    unMinable is a command-line based cryptocurrency mining tool designed for efficient and user-friendly Bitcoin mining. It provides real-time hardware detection, mining process control, balance management, and automated withdrawal functionality. The software is designed to interact with Firebase to fetch and store user balances, withdrawals, and user-related data securely.
    Downloads: 8 This Week
    Last Update:
    See Project
  • Easy-to-use Business Software for the Waste Management Software Industry Icon
    Easy-to-use Business Software for the Waste Management Software Industry

    Increase efficiency, expedite accounts receivables, optimize routes, acquire new customers, & more!

    DOP Software’s mission is to streamline waste and recycling business’ processes by providing them with dynamic, comprehensive software and services that increase productivity and quality of performance.
    Learn More
  • 5
    BIP39-XOR

    BIP39-XOR

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array ("seed")

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array (so-called "seed phrase") using exclusive OR (XOR)/Vernam cipher (a.k.a. One Time Pad). If not input by a user, an encryption key is automatically generated at random. Encryption with such a key preserves integrity of BIP-39 checksums of all keys (that's distinct while also compatible with SeedXOR implementation).
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon is a data encryption and sharding method designed to secure data in potentially untrusted off-site storage locations. It uses AES-256 encryption with a randomly generated passphrase, followed by obfuscation techniques to make the encrypted file unidentifiable. The data is then sharded into one private chunk containing the encryption key and part of the data, and multiple public chunks. Each chunk is renamed using its SHA-512 hash, and all chunks are timestamped equally. A filename...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next