diff --git a/examples/load_binary_encrypted_message.py b/examples/load_binary_encrypted_message.py
index 1853cafaf0ea2ee0e48daeea8e6cb75fc62d230f..a8a3060c3294e74d2a03f34476a74329b5c6fea9 100644
--- a/examples/load_binary_encrypted_message.py
+++ b/examples/load_binary_encrypted_message.py
@@ -21,17 +21,14 @@ import sys
 from duniterpy.key import SigningKey
 
 
-def load_binary_encrypted_message():
-    if len(sys.argv) < 2:
-        print(
-            """
-        Usage:
-            python decrypt_message.py ENCRYPTED_MESSAGE_FILEPATH
-        """
-        )
-
-    # capture encrypted message filepath argument
-    signed_message_path = sys.argv[1]
+def load_binary_encrypted_message(signed_message_path=None):
+    if not signed_message_path:
+        if len(sys.argv) < 2:
+            print("Usage: python decrypt_message.py ENCRYPTED_MESSAGE_FILEPATH")
+            sys.exit(1)
+
+        # capture encrypted message filepath argument
+        signed_message_path = sys.argv[1]
 
     # prompt hidden user entry
     salt = getpass.getpass("Enter your passphrase (salt): ")
diff --git a/examples/load_binary_signed_message.py b/examples/load_binary_signed_message.py
index 857390faed074807128d1fef3d9351a452571ece..3031e35e637d988e429d3beb582533eaece473be 100644
--- a/examples/load_binary_signed_message.py
+++ b/examples/load_binary_signed_message.py
@@ -19,17 +19,14 @@ import sys
 
 from duniterpy.key import VerifyingKey
 
-def load_binary_signed_message():
-    if len(sys.argv) < 2:
-        print(
-            """
-        Usage:
-            python verify_signed_message.py SIGNED_MESSAGE_FILEPATH
-        """
-        )
-
-    # capture signed message filepath argument
-    signed_message_path = sys.argv[1]
+def load_binary_signed_message(signed_message_path=None):
+    if not signed_message_path:
+        if len(sys.argv) < 2:
+            print("Usage: python verify_signed_message.py SIGNED_MESSAGE_FILEPATH")
+            sys.exit(1)
+
+        # capture signed message filepath argument
+        signed_message_path = sys.argv[1]
 
     # ask public key of the signer
     pubkeyBase58 = input("Enter public key of the message issuer: ")
diff --git a/examples/load_credentials_file.py b/examples/load_credentials_file.py
index 70e6a49f1310fd66bbb8c7facbb32d3573253008..997213c843bc451f329dbd9856be202c5d273893 100644
--- a/examples/load_credentials_file.py
+++ b/examples/load_credentials_file.py
@@ -19,13 +19,14 @@ import sys
 
 from duniterpy.key import SigningKey
 
-def load_credentials_file():
-    if len(sys.argv) < 2:
-        print("Usage: python load_credentials_file.py FILEPATH")
-        sys.exit(1)
-
-    # capture filepath argument
-    credentials_filepath = sys.argv[1]
+def load_credentials_file(credentials_filepath=None):
+    if not credentials_filepath:
+        if len(sys.argv) < 2:
+            print("Usage: python load_credentials_file.py FILEPATH")
+            sys.exit(1)
+
+        # capture filepath argument
+        credentials_filepath = sys.argv[1]
 
     # create SigningKey instance from file
     signing_key_instance = SigningKey.from_credentials_file(
diff --git a/examples/load_scuttlebutt_file.py b/examples/load_scuttlebutt_file.py
index 48cff9a8ebea9250b71224f9d4f5a2db76fa2ff3..dcfd38c245e5ac5973d59e268343be740a616238 100644
--- a/examples/load_scuttlebutt_file.py
+++ b/examples/load_scuttlebutt_file.py
@@ -19,13 +19,14 @@ import sys
 
 from duniterpy.key import SigningKey
 
-def load_scuttlebutt_file():
-    if len(sys.argv) < 2:
-        print("Usage: python load_scuttlebutt_file.py FILEPATH")
-        sys.exit(1)
-
-    # capture filepath argument
-    scuttlebutt_filepath = sys.argv[1]
+def load_scuttlebutt_file(scuttlebutt_filepath=None):
+    if not scuttlebutt_filepath:
+        if len(sys.argv) < 2:
+            print("Usage: python load_scuttlebutt_file.py FILEPATH")
+            sys.exit(1)
+
+        # capture filepath argument
+        scuttlebutt_filepath = sys.argv[1]
 
     # create SigningKey instance from file
     signing_key_instance = SigningKey.from_ssb_file(