Skip to content

Instantly share code, notes, and snippets.

View bergpb's full-sized avatar
💻
https://bergpb-blog.pgs.sh

Lindemberg Barbosa bergpb

💻
https://bergpb-blog.pgs.sh
View GitHub Profile
@selcukcihan
selcukcihan / AGENTS.md
Created April 15, 2026 09:06
agents.md file for your beloved coding agents

Project Rules

These instructions apply to every task performed in this repository.

Purpose

  • Treat this file as the project-wide source of truth for repository-specific working rules.
  • Read and follow these instructions before making changes in this repo.

Working Style

  • Prefer minimal, targeted changes over broad refactors.
@kieranklaassen
kieranklaassen / token_analysis.py
Created April 6, 2026 20:24
Claude Code token usage analyzer - breaks down usage by project, session, and subagent
#!/usr/bin/env python3
"""
Claude Code token usage analyzer.
Analyzes ~/.claude/projects/ JSONL files for token usage patterns.
"""
import json
import os
import sys
from pathlib import Path
@simoninglis
simoninglis / README.md
Created February 3, 2026 00:19
CI status in tmux status bar (GitHub Actions + Gitea Actions)

CI Status in tmux Status Bar

Put your CI build status in your tmux status bar. Know immediately when something breaks.

C:✓ B:✓ D:✓ V:✓ │ 14:32 01-Feb

Why?

@XDflight
XDflight / README.md
Last active April 22, 2026 01:13
Remove cache and old extensions under "~/.vscode-server/" on your Linux server

If you often connect to your Linux server using VSCode, the "~/.vscode-server/" folder (and sometimes the ~/.cache/ folder too) can get very large because VSCode:

  1. Does NOT clean its download cache after installing extensions;
  2. Does NOT delete old extensions after updating them;
  3. Does NOT remove old VSCode servers after installing a new version.

If your server storage space is limited, you might consider cleaning "~/.vscode-server/" (and ~/.cache/) regularly using the bash script I wrote. Simply run the following command:

curl -sL https://gist.githubusercontent.com/XDflight/5f3509eb84fc282b88059c909036f5bc/raw/07aa29746c9b085fce84702967bdfe6ac019c8b6/clean_vscode-server.sh | bash -s
type: sidebar
path: "0"
cards:
- type: custom:bubble-card
card_type: button
button_type: switch
modules:
- default
show_icon: false
scrolling_effect: false
@gazwald
gazwald / k3s.md
Last active October 28, 2025 23:50
Quick and dirty k3s/metallb/longhorn setup

Overview

Quick and dirty tutorial for setting up a K3S cluster on three nodes with MetalLB and Longhorn.

  • All commands are assumed to be run as root, within /root
  • I barely know what I'm doing so if it works that's great!

With my setup;

  • Three systems with a single NVMe drive.
@hackermondev
hackermondev / research.md
Last active April 30, 2026 19:12
Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform

hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.

3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.

I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:

Cloudflare

By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k

@rochacbruno
rochacbruno / A.md
Created February 9, 2024 14:16
Delete youtube watch later

Delete whatch later videos from youtube

  • OPen youtube, change language to English
  • Go to your watch later playlist
  • OPen the inspect -> console
  • Paste the script and execute it