The FReakSHell aims to be a sh-compatible shell and command language interpreter that has some advanced features that can not be found in other shells. It aims towards POSIX compliance by trying to implement the IEEE POSIX Shell and Tools specification (IEEE Working Group 1003.2). Advanced features include advanced job control (i.e. job exchange between different processes, dynamic repiping) and built-in auto-completion.
optcomplete is a Python module that provides programmable shell completion support for Python scripts that use the optparse module. It implements the Bash completion protocol, and a simple common shell function invokes the script to provide the completion suggestions. As an optparse parser already contains most of the useful information to provide completions, only two lines of code are required to provide basic support for completions to an existing script. It also allows the developer to provide per-option completion, etc.
The Aardvark Shell Utils is a collection of three utilities designed to aid the user when working with shell scripts or from the command line. All three accept input on the command line or from standard input, and thus they can be piped with other commands. All commands come with their own man page. Included are realpath, filebase, and fileext.
FrAid (Fr[actal] Aid) is a programming language that is appropriate for mathematical computations, visualization, batch processing, and more. It features both a standalone application that provides a programming environment for the language and a system for integrating the language with Java. The Java interface allows mathematical equations and formulas to be used with Java code, making it easier to process numerical computations, symbolic computations, imaging, CAD, and more.
Fush is a Unix shell replacement. It provides improved support for logging the user's commands. Fush allows you to restrict and log everything that a user does. You can restrict shell operators, maximum command length, background tasks, or limit which commands can be executed from the command line. A list of MD5 sums is kept on all system binaries. When a user tries to execute a command, an MD5 hash is generated and is compared against the user's ACL. If the MD5 sum and full path match an approved command in the ACL, the command is executed.