expect-lite is an quick and easy command line automation tool. Written in expect, it is designed to directly map an interactive terminal session into an automation script. expect-lite scripts use special character(s) at the beginning of each line to indicate the action. Basic expect-lite scripts can be created by simply cutting and pasting text from a terminal window into a script, and adding '>' '<' characters. No knowledge of expect is required. Expect-lite is targeted at the verification testing environment, and will produce a Pass/Fail result at the end of the script. However, its use is not limited to this environment. It includes a powerful debugger with breakpoints, step/skip, and the ability to copy/paste expect-lite lines right into a running script.
The klish is a framework for implementing Cisco-like command-line interfaces on Unix systems. It is configurable through XML files. "Klish" stands for "Kommand Line Interface SHell". The klish is a fork of clish-0.7.3. The original clish was developed by Graeme McKerrell. The klish adds some new features, but is compatible (as much as possible) with clish's XML configuration files.
vcprompt prints a short string, to be included in your shell prompt, with barebones information about the current working directory for various version control systems. It is designed to be small and lightweight rather than comprehensive. It has varying degrees of recognition for Mercurial, Git, Subversion, CVS, and Fossil working copies.
vmm is an easy-to-use and configurable commandline tool for administrators and postmasters, used to manage domains, alias-domains, accounts, and relocated mail users. It allows fast and easy management of mail servers. It's designed for installations using Dovecot and Postfix with a PostgreSQL backend.
360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to logs, merge, translate, and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA, or ScreenOS commands. It is all contained in one file. It can read policy and logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), and Cisco ASA (show run / syslog format). It uses both inclusive and exclusive CIDR and text filters, permitting you to split large policies into smaller ones for virutalization at the same time as removing unused connectivity. It supports policy to log association, object translation, rulebase reordering and simplification, rule moves, and duplicate matching automatically. It allows you to seamlessly move rules to where you need them. 'print' mode creates a spreadsheet for your audit needs with one command.