imapsync is a tool for facilitating incremental recursive IMAP transfers from one mailbox to another. It is useful for mailbox migration or backup, and reduces the amount of data transferred by only copying messages that are not present on both servers. Read, unread, and deleted flags are preserved, and the process can be stopped and resumed. The original messages can optionally be deleted after a successful transfer.
ColorLogs is an output-colorizing Perl script intended to have command output piped through it to a terminal. It allows easy creation of new highlighting configurations using simple text matches, globs, or regular expressions. It works transparently even in interactive contexts with scripts that produce prompt lines and wait for user input. Patterns are provided for Ant and Maven output. This version started as a fork of v1.1 from resentment.org, but numerous improvements have been made since then.
icli is a command line interface to the Icinga monitoring software. You can use it to list service/host status with many filtering options, schedule rechecks, and acknowledge service problems. Basic support for viewing the command queue and scheduled downtimes is also present. It is largely compatible with Nagios.
hashl creates a database with partial file hashes. It is useful for checking if you already have a copy of files before transferring them over a slow network. It does this by hashing only the first few MiB of every file. This gives it a huge speed advantage at the cost of possible (though pretty improbable) false positives.
raps2 is a simple password safe. You give it a name, a password, and optional metadata, and it will encrypt and store them for you. It uses Eksblowfish for crypto, which offers a configurable key setup time, so you can make it as slow as you want. Each password is saved in a separate file, making it easy to track them in version control.
ssh-forcecommand is a script to safely execute remote commands via ssh. It is especially aimed at automated remote commands (in which ssh keys are not secured via password), where a compromise of the remote system could also compromise the local system. To prevent this, ssh-forcecommand can be invoked through the ssh configuration, which will limit the remote system so that it can only execute a set of statically defined commands. This way, compromising the local system is made much more difficult.