ConMan is a serial console management program designed to support a large number of console devices and simultaneous users. It supports local serial devices, remote terminal servers (via the telnet protocol), IPMI Serial-Over-LAN (via FreeIPMI), Unix domain sockets, and external processes (e.g., using Expect to control connections over telnet, ssh, or IPMI Serial-Over-LAN). Its features include logging (and optionally timestamping) console device output to file, connecting to consoles in monitor (R/O) or interactive (R/W) mode, allowing clients to share or steal console write privileges, and broadcasting client output to multiple consoles.
Libtermui is a terminal driver library. It is fully standalone and lightweight. It does not rely on termcap or curses libraries. It can drive terminals on a TTY or through a telnet connection directly on a TCP socket. It is fully re-entrant, and can be used to drive multiple terminals from different threads. It includes a getline feature (similar to the one in readline) and some console user interface facilities.
Soiled is a Flash-based telnet client and terminal emulator, supporting both char-by-char and line-by-line mode. In line-by-line mode, it has some features that make it suitable for MUDs, such as aliases, macros, and hotkeys. Since it is implemented in Flash, it can be used from a Web browser.
PAC provides a GUI to configure SSH and Telnet connections, including usernames, passwords, EXPECT regular expressions, and macros. It is similar in function to SecureCRT or Putty. It is intended for people who connect to many servers through SSH. It can automate logins and command executions.
Paranoid TelnetD is written in straight C with few dependencies. It is intended for use with embedded or legacy devices (like the hand-scanners used in warehouses) that communicate via telnet. It features: 'telnet only' user accounts, separate from the system authentication (so only the specified usernames/passwords can login via telnet, and only via telnet); user, IP address, and MAC address whitelisting/blacklisting; chrooting with 'bind mounts' to allow access to certain directories under the chroot jail; and 'honeypot mode' in which all authentication fails and all events are logged at syslog 'crit' level.