dirtypgp is a quick-and-dirty wish script to run in a X Window environment. It is a workslate upon which clear or cipher text may be cut and pasted. A series of button controls then are used to convert to and from ciphered and clear text, encoded with the PGP package. It was originally written by Carsten Meyer, who released it under the GPL.
CryptSharp provides a number of password crypt algorithms: BCrypt, MD5 (and Apache's htpasswd variant), PHPass (WordPress, phpBB, Drupal), SHA256, SHA512, and Traditional and Extended DES. It also includes Blowfish, SCrypt, and PBKDF2 for any HMAC (.NET's built-in PBKDF2 implementation supports only SHA-1). If you are looking to store passwords, odds are CryptSharp will have the algorithm you want.
MonoDecrypt uses pattern matching and its knowledge about character frequencies in order to decrypt messages encoded with a monoalphabetic substitution cipher. MonoDecrypt can decrypt texts of any language, as long as it has sufficient information about the language. Depending on the information you give it, the tool decrypts about 50%-100% on its own. Then you can decrypt the remaining data by filling the gaps or correcting bad guesses. MonoDecrypt can also encrypt texts using monoalphabetic substitution.
libencio is a library providing a stdio-like interface for reading and writing of encrypted files (in MCrypt format only for now). Additionally, it provides full support for fseek()-like random read access of encrypted data. This allows one to operate on encrypted files as if they were ordinary, cleartext files. It could be used to provide MUAs with a layer to transparently handle encrypted attachments, as a backend to ffmpeg or mplayer to directly play encrypted files, or in combination with tar for encrypted backups. It uses libmcrypt and libmhash for encryption and hashing algorithms.
Arandomd is a network daemon that provides statistically tested output from a single ARC4 stream cipher generator to anyone able to connect to its listening TCP port. As multiple consumers cause it to reseed itself from a separate, strong random source, it is expected to produce consistently unpredictable results for cryptographic purposes. A configurable number of tests from the Statistical Test Suite for Random and Pseudorandom Number Generators must be passed before output data is sent to the client. It may be be useful in low-entropy environments, such as compute clouds, for generating high quality key material for strong cryptography.
Random Tools is a collection of tools you can use to collect random data and feed it to the kernel random pool. At present, only collecting from your sound card (/dev/dsp) is supported, but adding support for other sources of randomness (sometimes referred to as "entropy sources" or "random generators") should be easy. You can test the input with FIPS 140-2 tests before writing it to /dev/random.