Socat is a relay for bidirectional data transfer between two independent data channels. Each of these data channels may be a file, pipe, device (terminal or modem, etc.), socket (Unix, IP4, IP6 - raw, UDP, TCP), SSL, a client for SOCKS4, or proxy CONNECT. It supports broadcasts and multicasts, abstract Unix sockets, Linux tun/tap, GNU readline, and PTYs. It provides forking, logging, and dumping and different modes for interprocess communication. Many options are available for tuning socat and its channels. Socat can be used, for example, as a TCP relay (one-shot or daemon), as a daemon-based socksifier, as a shell interface to Unix sockets, as an IP6 relay, or for redirecting TCP-oriented programs to a serial line.
dvtm brings the concept of tiling window management, popularized by X11-window managers like dwm, to the console. As a console window manager, it tries to make it easy to work with multiple console based programs like vim, mutt, cmus, or irssi. dvtm is intended to be used where X11 isn't available or over SSH. In conjunction with dtach, it can be seen as a lightweight alternative to GNU screen.
RCSSmin is a CSS minifier. The implementation is based on the semantics of the YUI compressor, but aiming for speed instead of maximum compression so that it can be used at runtime rather than during a preprocessing step. rCSSmin does syntactical compression only (removing spaces, comments, and possibly semicolons). It does not provide semantic compression (like removing empty blocks, collapsing redundant properties etc). It does, however, support various CSS hacks (by keeping them working as intended).
ipt_pkd is an iptables extension implementing port knock detection with SPA (single packet authorization). This project provides 3 parts: the kernel module ipt_pkd, the iptables user space module libipt_pkd.so, and a user space client knock program. For the knock packet, it uses a UDP packet sent to a random port that contains a SHA-256 of a timestamp, small header, random bytes, and a shared key. ipt_pkd checks the time window of the packet and does the SHA-256 to verify the packet. The shared key is never sent.