Skip to content

Instantly share code, notes, and snippets.

View bergpb's full-sized avatar
💻
https://bergpb-blog.pgs.sh

Lindemberg Barbosa bergpb

💻
https://bergpb-blog.pgs.sh
View GitHub Profile
@XDflight
XDflight / README.md
Last active December 5, 2025 20:28
Remove cache and old extensions under "~/.vscode-server/" on your Linux server

If you often connect to your Linux server using VSCode, the "~/.vscode-server/" folder (and sometimes the ~/.cache/ folder too) can get very large because VSCode:

  1. Does NOT clean its download cache after installing extensions;
  2. Does NOT delete old extensions after updating them;
  3. Does NOT remove old VSCode servers after installing a new version.

If your server storage space is limited, you might consider cleaning "~/.vscode-server/" (and ~/.cache/) regularly using the bash script I wrote. Simply run the following command:

curl -sL https://gist.githubusercontent.com/XDflight/5f3509eb84fc282b88059c909036f5bc/raw/b6b02d41c66c84d6332eb947c669dcd8973f393e/clean_vscode-server.sh | bash -s
type: sidebar
path: "0"
cards:
- type: custom:bubble-card
card_type: button
button_type: switch
modules:
- default
show_icon: false
scrolling_effect: false
@gazwald
gazwald / k3s.md
Last active October 28, 2025 23:50
Quick and dirty k3s/metallb/longhorn setup

Overview

Quick and dirty tutorial for setting up a K3S cluster on three nodes with MetalLB and Longhorn.

  • All commands are assumed to be run as root, within /root
  • I barely know what I'm doing so if it works that's great!

With my setup;

  • Three systems with a single NVMe drive.
@hackermondev
hackermondev / research.md
Last active December 2, 2025 14:11
Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform

hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.

3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.

I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:

Cloudflare

By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k

@rochacbruno
rochacbruno / A.md
Created February 9, 2024 14:16
Delete youtube watch later

Delete whatch later videos from youtube

  • OPen youtube, change language to English
  • Go to your watch later playlist
  • OPen the inspect -> console
  • Paste the script and execute it
@hivian
hivian / raspberry-pi-static-ip.md
Last active October 31, 2025 21:45
Set a static IP Address on Raspberry Pi OS Bookworm (october 2023 update)

Use static network IP address on Raspberry PI Bookworm

With the release of Raspberry Pi OS Bookworm, networking on the Raspberry Pi was changed to use NetworkManager as the standard controller for networking, replacing the previous dhcpcd system. NetworkManager includes a command line tool called "nmcli," which can control NetworkManager and report on the network status.

Step 1

Display the list of network interfaces:

sudo nmcli -p connection show
@fabriciojf
fabriciojf / uptime-kuma.conf
Created October 23, 2023 16:50 — forked from spiritualized/uptime-kuma.conf
Uptime Kuma reverse proxy nginx config for a URL prefix
# nginx configuration snippet for running Uptime Kuma on a URL prefix
# set up for yourdomain.com/kuma, with traffic forwarded to a docker
# container with the hostname 'uptime-kuma'
# Use docker's DNS
resolver 127.0.0.11;
# uptime kuma
location /uptime {
@LiquidityC
LiquidityC / Makefile
Last active March 21, 2025 07:48
Generic drop in Makefile
VERSION = \"1.0.0\"
PREFIX ?= out
INCDIR = include
SRCDIR = src
LANG = c
OBJDIR = .obj
MODULE ?= binary_name
CC ?= gcc