imapsync is a tool for facilitating incremental recursive IMAP transfers from one mailbox to another. It is useful for mailbox migration or backup, and reduces the amount of data transferred by only copying messages that are not present on both servers. Read, unread, and deleted flags are preserved, and the process can be stopped and resumed. The original messages can optionally be deleted after a successful transfer.
hashl creates a database with partial file hashes. It is useful for checking if you already have a copy of files before transferring them over a slow network. It does this by hashing only the first few MiB of every file. This gives it a huge speed advantage at the cost of possible (though pretty improbable) false positives.
raps2 is a simple password safe. You give it a name, a password, and optional metadata, and it will encrypt and store them for you. It uses Eksblowfish for crypto, which offers a configurable key setup time, so you can make it as slow as you want. Each password is saved in a separate file, making it easy to track them in version control.
QuHelp is a command-line program that scans a directory with HTML formatted text files and builds a help site using that directory's content and a template. A default template is included, but any template can be specified. QuHelp adds a nice expandable tree view of the help site's contents, a navigator, permalinks, and other useful stuff for browsing the help site.
slackeria takes a list of projects and checks whether they are present in certain places, such as freshmeat or various distributions. If they are, their version is also reported. This makes it easy to monitor projects and, for example, to notify distributions of updates when they are lagging behind.
ssh-forcecommand is a script to safely execute remote commands via ssh. It is especially aimed at automated remote commands (in which ssh keys are not secured via password), where a compromise of the remote system could also compromise the local system. To prevent this, ssh-forcecommand can be invoked through the ssh configuration, which will limit the remote system so that it can only execute a set of statically defined commands. This way, compromising the local system is made much more difficult.