DCENT Toolbox — D-Central Technologies
The Open-Source Bitcoin Miner Swiss Knife
DCENT Toolbox is a Python CLI for managing, diagnosing, and securing Bitcoin miners across every major firmware platform. 35+ commands. 18 security modules. 6 firmware platforms. Zero dev fee. Currently in closed beta — public beta expected summer 2026.
What is DCENT Toolbox?
DCENT Toolbox is a command-line tool that speaks every major miner firmware language. Stock Bitmain, BraiinsOS, VNish, LuxOS, BitAxe, WhatsMiner — one tool manages them all. Built in Python with async networking at its core, it discovers miners on your network, diagnoses problems, audits security, manages pools, tunes performance, and unlocks capabilities that stock firmware hides from you.
With 35+ commands organized across discovery, diagnostics, security, pool management, and tuning categories, DCENT Toolbox replaces the patchwork of vendor-specific tools, web interfaces, and SSH scripts that most mining operations rely on. One tool. Every miner. Every firmware. Every task.
DCENT Toolbox is currently in closed beta. We are testing across real mining operations before opening it up. Public beta is expected summer 2026. The entire codebase is GPL-3.0 open source — no dev fees, no telemetry, no hidden costs. When it ships, you get the source.
$ dcent-toolbox scan --subnet 192.168.1.0/24
Scanning 254 hosts...
Found 12 miners:
192.168.1.101 S19 Pro BraiinsOS+ 110 TH/s
192.168.1.102 S19 XP Stock 140 TH/s
192.168.1.103 S19k Pro VNish 120 TH/s
192.168.1.104 S21 LuxOS 200 TH/s
192.168.1.105 M50S WhatsMiner 126 TH/s
192.168.1.110 BitAxe Ultra AxeOS 500 GH/s
...
$ dcent-toolbox audit 192.168.1.103
[INFO] Scanning firmware... VNish 1.2.6 detected
[INFO] Checking SSH keys... 2 authorized keys found
[INFO] Checking pool configuration... 1 primary, 0 hidden
[INFO] Running binary hash verification... all binaries match known-good set
[INFO] Checking authentication... root password is set
[PASS] Audit complete. No issues found.
$ dcent-toolbox scan 192.168.1.0/24
Found 7 miners:
192.168.1.101 Antminer S9 Stock 13.5 TH/s
192.168.1.102 Antminer S19 BraiinsOS 95 TH/s
192.168.1.103 Antminer S19 VNish 104 TH/s
Async network scanning, security auditing, and remediation — all from a single CLI. Currently in closed beta.
Standing on the Shoulders of Giants
DCENT Toolbox does not exist in a vacuum. It exists because others built the foundations we stand on.
pyasic Paved the Way
The pyasic library proved that multi-vendor miner management in Python was not only possible but practical. It showed the community that you could talk to Bitmain, WhatsMiner, and other miners through a single abstraction layer. pyasic solved the hardest problem first: making different firmware APIs speak a common language. We learned from that work, and we are grateful for it.
Braiins Toolbox Set the Standard
Braiins Toolbox showed what a professional-grade miner management tool could look like. Firmware installation, fleet scanning, batch operations — Braiins demonstrated the workflows that mining operations actually need. Their toolbox raised the bar for what miners should expect from management software. We respect that contribution to the ecosystem.
The Open-Source Mining Community
Every script shared on GitHub, every protocol reverse-engineered in a forum post, every firmware modification published under an open license — this collective work is what makes tools like DCENT Toolbox possible. The Bitcoin mining community has a long tradition of sharing knowledge. We build on that tradition, and we give back to it. GPL-3.0, always.
DCENT Toolbox adds what we believe was missing: deep security auditing, security and unlock modules, EEPROM access, and a unified CLI that covers the full lifecycle of miner management — from discovery to diagnostics to remediation. Not a replacement for what came before. An extension of it.
35+ Commands Across 6 Categories
Every command exists because a real mining operation needed it. Organized by workflow, not by vendor.
Discovery & Scanning
Async network scanning finds every miner on your subnet in seconds. Auto-detects firmware type, model, and current status. Supports CIDR ranges, IP lists, and single targets. The scanner identifies Stock Bitmain, BraiinsOS, VNish, LuxOS, BitAxe, and WhatsMiner devices — no manual configuration required. Know exactly what is running on your network before you touch anything.
Diagnostics
Pull hashboard status, chip temperatures, fan speeds, power consumption, and error logs from any supported miner. Identify failing ASIC chips, overheating domains, and degraded hashboards before they become full failures. The diagnostic commands give you the same data a repair technician would pull — without opening the miner or connecting a serial console.
Security Audit
18 security modules power the audit engine. Detect unauthorized SSH keys, unexpected pool configurations, unrecognized binaries, and weak authentication that could leave your miner exposed. The audit produces a clear report: what was found, what the risk is, and what the remediation steps are. Know if your miners are truly yours.
Unlock & Flash
Signature bypass for locked Bitmain firmware. SSH enabler for stock miners that block shell access. Full SSH NAND install pipeline for flashing BraiinsOS, VNish, LuxOS, or reverting to stock. EEPROM read and write for board-level data. These are the tools that repair shops and fleet operators need — the ones that vendor firmware intentionally locks away.
Pool Management
Read, set, and batch-update pool configurations across your entire fleet. Switch hundreds of miners from one pool to another in a single command. Verify that every miner is pointing where you expect — no more discovering weeks later that a miner has been quietly hashing to someone else’s pool. Supports all Stratum URL formats across all firmware platforms.
Tuning
Fan speed control, frequency adjustment, and voltage tuning across supported firmware platforms. Set power targets, adjust clock speeds, and optimize efficiency — all from the command line. The tuning commands respect each firmware’s API, using the native controls rather than dangerous low-level overrides. Tune safely, tune precisely, tune at scale.
Supported Firmware Platforms
One tool that speaks every firmware language. No more juggling vendor-specific interfaces.
| Platform | Discovery | Diagnostics | Pool Mgmt | Tuning | Security Audit | Security/Unlock |
|---|---|---|---|---|---|---|
| Stock Bitmain (Antminer) | Yes | Yes | Yes | Yes | Yes | Yes (signature bypass, SSH enable) |
| BraiinsOS / BraiinsOS+ | Yes | Yes | Yes | Yes | Yes | NAND flash pipeline |
| VNish | Yes | Yes | Yes | Yes | Yes | Yes |
| LuxOS | Yes | Yes | Yes | Yes | Yes | NAND flash pipeline |
| BitAxe (AxeOS) | Yes | Yes | Yes | Yes | — | — |
| WhatsMiner | Yes | Yes | Yes | Yes | Yes | — |
Platform support varies by command category. Discovery and diagnostics work across all platforms. Security modules scan for common firmware vulnerabilities across all supported platforms.
Security Audit: Know What Your Miners Are Really Doing
Third-party firmware can be a black box. DCENT Toolbox opens it.
Unauthorized Access Detection
Third-party firmware can install unauthorized SSH keys that give remote access to your miners. DCENT Toolbox scans for known backdoor keys across all supported firmware platforms, flags them, and can remove them. The remediation module strips unauthorized keys, hardens SSH configuration, and re-audits to confirm the miner is clean. Your miner, your keys, nobody else’s.
Devfee Discrepancy Detection
Some firmware skims hashrate by adding hidden pool configurations that redirect a percentage of your mining to the firmware developer’s wallet. DCENT Toolbox inspects all configured pools — including ones hidden from the web interface — and flags any that do not match your expected configuration. If someone is taking a cut of your hashrate, you will know about it.
Phone-Home Binary Detection
The audit engine maintains a database of known-good binaries for each firmware platform. It hashes every binary on the miner’s filesystem and flags anything that does not match. Unknown binaries that phone home to external servers — reporting your IP, hashrate, or configuration — get flagged immediately. You should know every process running on your miner. Now you can.
Authentication Audit
Empty root passwords. Default credentials left unchanged. SSH configured to allow password authentication from any IP. These are the low-hanging fruit that attackers exploit to hijack miners on shared networks, colocation facilities, and poorly segmented home networks. The authentication audit checks it all and tells you exactly what to fix.
Current Status: Closed Beta
DCENT Toolbox is functional and actively used in D-Central’s own repair and operations workflow. We are not releasing it publicly until it meets the standard we expect from tools we put our name on.
What Works Today
- Full async network discovery across all 6 firmware platforms
- 35+ CLI commands covering diagnostics, pools, tuning, and security
- 18 security/unlock modules including firmware backdoor detection
- Signature bypass and SSH enabler for locked Bitmain firmware
- SSH NAND install pipeline for firmware flashing
- EEPROM read/write for board-level operations
- Complete security audit with remediation
What We Are Testing
- Edge cases across firmware versions and hardware revisions
- Batch operations at fleet scale (100+ miners)
- Error handling and recovery for network-interrupted operations
- Documentation and installation guides for all major platforms
- Plugin architecture for community-contributed modules
Timeline
- Now: Closed beta — internal use and select testers
- Summer 2026: Public beta — GPL-3.0 source release
How to Get Involved
DCENT Toolbox is built by miners, for miners. When the public beta launches, we want it shaped by the people who will actually use it.
Mining Operations
If you manage a fleet of miners and want early access to test DCENT Toolbox in your environment, reach out. We are especially interested in operators running mixed firmware environments — the messier your setup, the more useful your feedback will be. Contact us through the contact page or our Discord server.
Repair Technicians
The security and unlock modules were built for the repair bench. Signature bypass, EEPROM access, firmware flashing — these are the tools that make the difference between a bricked miner and a recovered one. If you repair miners professionally, your workflow testing is invaluable. We want to know which commands save you time and which ones need refinement.
Developers
GPL-3.0 means the source code will be fully available at public beta launch. If you build mining tools, firmware, or management software, we welcome contributions. The plugin architecture is designed for community modules — add support for new hardware, new firmware platforms, or new audit checks. The Bitcoin mining ecosystem gets stronger when we build together.
One tool. Every miner. Every firmware. Open source. No dev fee. Coming summer 2026.
