Logger is a log queueing and optimization utility. It can completely replace sys/klogd, handle logs larger than 2GB, perform automatic nightly log rotation without affecting services, and transfer logs between machines via TCP connections. Any application that writes a text log can be maintained by Logger. It is light, small, and fast, emphasizes security, and reduces drive usage through memory queueing.
The MirBSD Korn Shell (mksh) is an actively developed successor of pdksh (the Public Domain Korn Shell), aimed at producing a shell good for interactive use, but with the primary focus on scripting. It is intended to be portable to most *nix-like operating systems as long as they're not too obscure. mksh incorporates improvements from OpenBSD and Debian, as well as bugfixes and enhancements developed for the MirOS, FreeWRT, and MidnightBSD projects and Android. The emacs command line editing mode is UTF-8 capable, and Byte Order Marks are ignored in scripts. The shell supports large files, as well as all pdksh and some csh, AT&T ksh, zsh, and GNU bash features, is compatible with the Bourne shell and POSIX (within limits), has no limit on array sizes, and incorporates some other useful builtins and features. While being already fast and small (without losing functionality), flags to make it even smaller can be given at compile time. An interactive shell reads "~/.mkshrc" on startup.
Wocvim is a WoC client for Vim. WoC is a protocol which enables the use of hyperlinks in plain ASCII texts. The links can point to local or remote locations. The protocol is specifically designed to support source code, but it can be used in any text. For source code, it's also possible to use ad-hoc tag generators like cscope and ctags.
Trojan scan is a simple shell script that allows for simple but relatively effective checking for trojans, rootkits and other malware that may be using your server and network for unwanted (and possibly illegal) purposes. It works by listing all processes that use the Internet with the lsof command (using -Pni flags). This list is then transformed into signatures in the form of process_name:port_number:user. These signatures then are matched against the allowed process defined in the configuration. If any signatures of running processes are found that do not match the allowed signatures, an email report is sent including ps, ls, and optional lsof output.
fakechroot provides a fake chroot environment to programs. A fake chroot allows you to run programs which require root privileges on an unprivileged user account. For example, you can create a Debian bootstrap or a development environment and build packages inside a chroot'ed system using a standard non-root user account. You can then use the apt-get command to install other packages without root privileges.
EPOR is an extensible package organiser for Unix-like systems. It's written to trace filesystem changes (something being installed) and save this information in a simple text database (this, as any other provided feature, is customisable via the embedded Guile interpreter). Database entries contain information supplied by the command line (package name, version, etc.) and traced by filesystem changes (new directories, files, etc.). This is achieved using the "LD_PRELOAD method''.