pwnat, pronounced "poe-nat", is a tool that allows any number of clients behind NAT gateways to communicate with a server behind a separate NAT with no port forwarding and no DMZ setup on any routers in order to directly communicate with each other. The server does not need to know anything about the clients trying to connect, nor does it need to communicate with any other hosts in order to initiate the communication. Simply put, this is a proxy server that works behind a NAT, even when the client is behind a NAT. There is no middle man, no proxy, no third party, no UPnP required, no spoofing, and no DNS tricks. More importantly, the client can then connect to any host or port on any remote host or to a fixed host and port decided by the server.
PyBit is a small application written in wxPython for shortening URLs using some of the best shortening engines like: bit.ly, is.gd, cli.gs, smsh.me, tr.im and posting status updates to Twitter or identi.ca. It tries to be as simple and as user-friendly as possible. Configuration uses a simple preferences dialog, and all the buttons and text are bigger. All passwords (for twitter and identi.ca) are stored in plain text, so it’s currently not secure. Under GNOME, pyBit stores the shortened URL directly to your clipboard, so you don’t have to select and copy the short URL.
pyFormex is a tool for generating, manipulating, and transforming large geometrical models of 3D structures by sequences of mathematical transformations. Thanks to a powerful (Python based) scripting language, it is very well suited for the automated design of spatial frame structures. It provides a wide range of operations on surface meshes, like STL type triangulated surfaces. There are provisions to import medical scan images. pyFormex can also be used as a pre- and post-processor for Finite Element analysis programs. Finally, it might be used just for creating some nice graphics.
pyHIDS is a host-based intrusion detection system. It uses an RSA signature to check the integrity of its database. Alerts are written in the logs of the system, and can be sent via email to a list of users or on IRC channels (through the irker IRC client). You can define rules to specify files to be checked periodically.