Skip to content

Instantly share code, notes, and snippets.

View csima's full-sized avatar

Caleb Sima csima

View GitHub Profile
Acquire Public ML Artifacts
Obtain Capabilities
Develop Adversarial ML Attack Capabilities
Acquire Infrastructure
Publish Poisoned Datasets
Poison Training Data
ML Supply Chain Compromise
Evade ML Model
Exploit Public-Facing Application
ML Model Inference API Access
# docker volume create algo
# docker build -t algo .
# docker run -v algo:/algo -v (local folder):/mnt -it algo
#
# - edit users in config.cfg
# - run /algo/start
#
# Adding or Removing Users
# If you chose the save the CA certificate during the deploy process, then Algo's own scripts can easily add and remove users from the VPN server.
# Update the users list in your config.cfg
#!/usr/bin/env ruby
# You can get a sparkpost / pushbullet api token by just signing up
# Modify the @airport var with the text of the dropdown box that is on the website for choosing a location for the appointment
@username = ''
@password = ''
@months = 2
@notify_subject = 'Global Entry Dates'
@email_from = 'from@test.com'
@email_to = 'to@test.com'
@email_return = 'bounce@test.com'
### Keybase proof
I hereby claim:
* I am csima on github.
* I am csima (https://keybase.io/csima) on keybase.
* I have a public key whose fingerprint is E9EA 58B3 A7A9 AB74 BDDD 6A07 54C9 A506 7E05 1AE1
To claim this, I am signing this object: