filter_evdev creates a virtual input device from a physical input device. It provides anytime configuration of positive, negative, or custom acceleration or sensitivity for each axis, or remapping axes or buttons as requested, e.g. inverting the two main mouse buttons or making the middle button act as the right button. Configuration can be dynamically changed by text commands sent to a UNIX socket. Commands apply to specific axes, buttons, or keys when moved in specified value ranges, and consist of custom arithmetic operations.
ColorLogs is an output-colorizing Perl script intended to have command output piped through it to a terminal. It allows easy creation of new highlighting configurations using simple text matches, globs, or regular expressions. It works transparently even in interactive contexts with scripts that produce prompt lines and wait for user input. Patterns are provided for Ant and Maven output. This version started as a fork of v1.1 from resentment.org, but numerous improvements have been made since then.
hashl creates a database with partial file hashes. It is useful for checking if you already have a copy of files before transferring them over a slow network. It does this by hashing only the first few MiB of every file. This gives it a huge speed advantage at the cost of possible (though pretty improbable) false positives.
raps2 is a simple password safe. You give it a name, a password, and optional metadata, and it will encrypt and store them for you. It uses Eksblowfish for crypto, which offers a configurable key setup time, so you can make it as slow as you want. Each password is saved in a separate file, making it easy to track them in version control.
ssh-forcecommand is a script to safely execute remote commands via ssh. It is especially aimed at automated remote commands (in which ssh keys are not secured via password), where a compromise of the remote system could also compromise the local system. To prevent this, ssh-forcecommand can be invoked through the ssh configuration, which will limit the remote system so that it can only execute a set of statically defined commands. This way, compromising the local system is made much more difficult.