Showing 10 open source projects for "using"

View related business solutions
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1
    Rust-Lightning

    Rust-Lightning

    Bitcoin Lightning library written in Rust

    ...The project implements all of the BOLT specifications in the 1.0 spec. The implementation has pretty good test coverage that is expected to continue to improve. It is also anticipated that as developers begin using the API, the lessons from that will result in changes to the API, so any developer using this API at this stage should be prepared to embrace that. LDK/Rust-Lightning is a generic library which allows you to build a lightning node without needing to worry about getting all of the lightning state machine, routing, and on-chain punishment code (and other chain interactions) exactly correct. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Learning Bitcoin from the Command Line

    Learning Bitcoin from the Command Line

    A complete course for learning Bitcoin programming and usage

    Learning Bitcoin from the Command Line is a tutorial for working with Bitcoin (and Lightning) that teaches direct interaction with the servers themselves, as the most robust and secure way to begin cryptocurrency work. This is a draft in progress, so that I can get some feedback from early reviewers. It is not yet ready for use. Learning Bitcoin from the Command Line is a project of Blockchain Commons. We are proudly a "not-for-profit" social benefit corporation committed to open source &...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    ta4j

    ta4j

    A Java library for technical analysis

    ...Then we have to build our trading strategy. It is made of two trading rules, one for entry, the other for exit. Ta4j comes with a set of basic trading rules/strategies which can be combined using boolean operators. Trading strategies can be easily compared according to a set of analysis criteria. Ta4j can also be used for live trading with more complicated strategies.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    Qtum

    Qtum

    Qtum Core Wallet

    ...This is the main network where the tokens hold value and should be guarded very carefully. If you are testing the network or developing unstable software on Qtum, we highly recommend using either testnet or regtest mode. A Proof of Stake consensus system which is optimized for Qtum's contract model. Any user can stake and help to secure the network. There is no voting, master nodes, or minimum amount required. There have been transactions as small as 2 Qtum that have created blocks in the past. Staking from smart contracts is under development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    unChain Bitcoin Private Key Calculator

    unChain Bitcoin Private Key Calculator

    Calculate the Private Key and recovery seed of any bitcoin address

    Using unChain Bitcoin Private Key Calculator you can calculate the Private Key or Recovery seed of any bitcoin address. If you lost the access on your bitcoin wallet this is your tool. Please don't use this software for malicious purposes.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 6
    BIP39-XOR

    BIP39-XOR

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array ("seed")

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array (so-called "seed phrase") using exclusive OR (XOR)/Vernam cipher (a.k.a. One Time Pad). If not input by a user, an encryption key is automatically generated at random. Encryption with such a key preserves integrity of BIP-39 checksums of all keys (that's distinct while also compatible with SeedXOR implementation).
    Downloads: 16 This Week
    Last Update:
    See Project
  • 7
    Slideshow Crypto Ticker

    Slideshow Crypto Ticker

    Real Time Slideshow Crypto Price Ticker For Raspberry Pi LCD Screens

    Open source / 100% FREE real time slideshow crypto price ticker for RaspberryPi device LCD screens, including 24 hour volume. Supports running in "slideshow mode", to show all the markets you want. Supports CoinGecko / Binance / Coinbase Pro / Kraken / Kucoin / Bitstamp / Bitfinex / HitBTC / OKex / Gate.io exchange markets (more market support coming in the future). 3.5" LCD Demo: https://www.youtube.com/watch?v=dXAhs8HXCn4 7" LCD Demo:...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    ...It uses AES-256 encryption with a randomly generated passphrase, followed by obfuscation techniques to make the encrypted file unidentifiable. The data is then sharded into one private chunk containing the encryption key and part of the data, and multiple public chunks. Each chunk is renamed using its SHA-512 hash, and all chunks are timestamped equally. A filename conversion table is created to restore the concatenation order during a restore. The method aims to guarantee confidentiality, integrity, and availability of data, regardless of the trustworthiness of the chosen storage environment, while protecting against data breaches and unauthorized access. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    BitcoinExchangeFH

    BitcoinExchangeFH

    Cryptocurrency exchange market data feed handler

    ...You can set it up quickly and record all the exchange data in a few minutes! If the exchange is not supported with the WebSocket API feed, it will automatically fall into using its REST API feed. The subscription section specifies the exchange and instruments to subscribe. After receiving the order book or trade update, each handler is updated. For example, for SQL database handler, it is updated with the corresponding SQl statements. The feed handler acts as a publisher in ZeroMQ. To receive the feed, please follow ZeroMQ instructions to start a subscriber. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Yeastar: Business Phone System and Unified Communications Icon
    Yeastar: Business Phone System and Unified Communications

    Go beyond just a PBX with all communications integrated as one.

    User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
    Learn More
  • 10
    Bitcoin PHP

    Bitcoin PHP

    Bitcoin PHP

    Bitcoin Market information using PHP
    Downloads: 4 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next