BAD (BAckup Daemon) "watches" a directory and copies any files or directories moved/copied into it to another "backup" directory automatically using inotify. It will automatically generates hashes for files using the md5 hashing algorithm, and stores them in a file for quick and easy integrity checking. It will log (mostly) everything it's doing, and makes it very convenient to grep for certain messages using multiple logging levels which the user can set to get the desired output. It has its own built-in uninstaller which will delete any and all files it has created (besides the user's watch and backup directories).
Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously.
netwmpager is an enhanced version of the original netwmpager-1.11 program written around 2005 by Timo Hirvonen. It should be compliant with the EWMH (or NetWM) specifications. This version implements virtual desktops split into different viewports, into different desks, or both, while the earlier version only supported desks. As a consequence, netwmpager-2 should work with most window managers; it has been tested especially with compiz, fluxbox, and fvwm. It also has many parametrizable features, and it implements a convenient zoom.
tpe-lkm is a Linux kernel module implementing Trusted Path Execution, a security feature that denies users from executing programs that are not owned by root, or are writable. This closes the door on a whole category of exploits where a malicious user tries to execute his or her own code to hack the system. Since the module doesn't use any kind of ACLs, it works out of the box with no configuration. It isn't complicated to test or deploy to current production systems. The module also has a few other grsecurity-inspired features implemented as "extras".
Xvisor is a type-1 hypervisor that aims to provide a monolithic, light-weight, portable, and flexible virtualization solution for ARMv5, ARMv7a, x86_64, and other CPU architectures. It primarily supports full virtualization, and hence supports a wide range of unmodified guest operating systems. Paravirtualization is optional and is supported in an architecture independent manner (such as pluggable PCI devices) to ensure that no changes are required in the guest OS.
bgt is a program for creating and maintaining a budget from the UNIX/Linux command line. It is written in ANSI C. For number processing, it uses the Binary Coded Decimal number engine from bc. For data storage, it uses SQLite. All functionality for the program is available from the command line and does not require a GUI. It should be portable to other environments, including Windows, but it uses Unix-only directory names, so it would need some tweaking.