Source Ruckus Linux is an embeddable, robust Linux meta-distribution. It's a collection of build tools, source packages, scripts, and documentation all ready to be built into a Linux distribution. It can be used out-of-the-box, but its real strength lies in being used as a base for your own distribution. In other words, it exists purely to be forked, although it can be used as-is.
Ixmon is a terminal based reader and monitor for RSS, Atom, YouTube, Vine, Instragram, Twitter, Gmail, weather, stocks, cryptocurrency, and more. Hundreds of data sources can be comfortably tracked and special syntax URLs such as stock://AAPL or coin://bitcoin allow you to extend the capabilities of RSS and put all this data in an interface you can search or quickly navigate through using VIM-style keyboard shortcuts. Items can be sorted by time or media type and network resources are conserved by using an exponential decay polling algorithm.
MasarLabs PatD is a daemon to ping or traceroute remote hosts, using IPv4 or IPv6 ICMP packets. It runs without root privileges, listening on a TCP local port for hosts to check. It uses a protocol simple to implement, so is useful in situations in which you cannot send native ICMP packets (for example, from a Java program). pat is a client you can use to talk to patd.
RuckusRD is a drop-in replacement for mkinitrd that's intended for use on embedded systems or removable media (e.g. live CDs), but is also perfectly usable on normal desktop Linux systems. Its main strength is its non-memory-retentive read-write root filesystem support, which combines a read-only SquashFS image with a RAM overlay. This utility is part of the Source Ruckus project.
Paranoid TelnetD is written in straight C with few dependencies. It is intended for use with embedded or legacy devices (like the hand-scanners used in warehouses) that communicate via telnet. It features: 'telnet only' user accounts, separate from the system authentication (so only the specified usernames/passwords can login via telnet, and only via telnet); user, IP address, and MAC address whitelisting/blacklisting; chrooting with 'bind mounts' to allow access to certain directories under the chroot jail; and 'honeypot mode' in which all authentication fails and all events are logged at syslog 'crit' level.