Text Generation
Transformers
Safetensors
English
gpt2
cybersecurity
passwords
text-generation-inference
Instructions to use CodeferSystem/GPT2-Hacker-password-generator-Medium with libraries, inference providers, notebooks, and local apps. Follow these links to get started.
- Libraries
- Transformers
How to use CodeferSystem/GPT2-Hacker-password-generator-Medium with Transformers:
# Use a pipeline as a high-level helper from transformers import pipeline pipe = pipeline("text-generation", model="CodeferSystem/GPT2-Hacker-password-generator-Medium")# Load model directly from transformers import AutoTokenizer, AutoModelForCausalLM tokenizer = AutoTokenizer.from_pretrained("CodeferSystem/GPT2-Hacker-password-generator-Medium") model = AutoModelForCausalLM.from_pretrained("CodeferSystem/GPT2-Hacker-password-generator-Medium") - Notebooks
- Google Colab
- Kaggle
- Local Apps
- vLLM
How to use CodeferSystem/GPT2-Hacker-password-generator-Medium with vLLM:
Install from pip and serve model
# Install vLLM from pip: pip install vllm # Start the vLLM server: vllm serve "CodeferSystem/GPT2-Hacker-password-generator-Medium" # Call the server using curl (OpenAI-compatible API): curl -X POST "http://localhost:8000/v1/completions" \ -H "Content-Type: application/json" \ --data '{ "model": "CodeferSystem/GPT2-Hacker-password-generator-Medium", "prompt": "Once upon a time,", "max_tokens": 512, "temperature": 0.5 }'Use Docker
docker model run hf.co/CodeferSystem/GPT2-Hacker-password-generator-Medium
- SGLang
How to use CodeferSystem/GPT2-Hacker-password-generator-Medium with SGLang:
Install from pip and serve model
# Install SGLang from pip: pip install sglang # Start the SGLang server: python3 -m sglang.launch_server \ --model-path "CodeferSystem/GPT2-Hacker-password-generator-Medium" \ --host 0.0.0.0 \ --port 30000 # Call the server using curl (OpenAI-compatible API): curl -X POST "http://localhost:30000/v1/completions" \ -H "Content-Type: application/json" \ --data '{ "model": "CodeferSystem/GPT2-Hacker-password-generator-Medium", "prompt": "Once upon a time,", "max_tokens": 512, "temperature": 0.5 }'Use Docker images
docker run --gpus all \ --shm-size 32g \ -p 30000:30000 \ -v ~/.cache/huggingface:/root/.cache/huggingface \ --env "HF_TOKEN=<secret>" \ --ipc=host \ lmsysorg/sglang:latest \ python3 -m sglang.launch_server \ --model-path "CodeferSystem/GPT2-Hacker-password-generator-Medium" \ --host 0.0.0.0 \ --port 30000 # Call the server using curl (OpenAI-compatible API): curl -X POST "http://localhost:30000/v1/completions" \ -H "Content-Type: application/json" \ --data '{ "model": "CodeferSystem/GPT2-Hacker-password-generator-Medium", "prompt": "Once upon a time,", "max_tokens": 512, "temperature": 0.5 }' - Docker Model Runner
How to use CodeferSystem/GPT2-Hacker-password-generator-Medium with Docker Model Runner:
docker model run hf.co/CodeferSystem/GPT2-Hacker-password-generator-Medium
Update README.md
Browse filesUpload information for this model.
README.md
CHANGED
|
@@ -1,3 +1,79 @@
|
|
| 1 |
-
---
|
| 2 |
-
license: apache-2.0
|
| 3 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
---
|
| 2 |
+
license: apache-2.0
|
| 3 |
+
language:
|
| 4 |
+
- en
|
| 5 |
+
base_model:
|
| 6 |
+
- openai-community/gpt2-medium
|
| 7 |
+
pipeline_tag: text-generation
|
| 8 |
+
tags:
|
| 9 |
+
- cybersecurity
|
| 10 |
+
- passwords
|
| 11 |
+
---
|
| 12 |
+
|
| 13 |
+
# GPT-2 Hacker password generator (medium)
|
| 14 |
+
|
| 15 |
+
This model was fine-tuned based on the GPT-2 Medium.
|
| 16 |
+
|
| 17 |
+
# About the fine-tuning process
|
| 18 |
+
|
| 19 |
+
Number of epochs: 1
|
| 20 |
+
|
| 21 |
+
A dataset of 50,000 passwords was used for fine-tuning of 128 tokens).
|
| 22 |
+
|
| 23 |
+
Total loss: 0.524064
|
| 24 |
+
|
| 25 |
+
Training time: 40 minutes (Google Colab free, T4 GPU)
|
| 26 |
+
|
| 27 |
+
# Using the model
|
| 28 |
+
|
| 29 |
+
Use this code:
|
| 30 |
+
|
| 31 |
+
```python
|
| 32 |
+
from transformers import AutoTokenizer, AutoModelForCausalLM
|
| 33 |
+
import torch
|
| 34 |
+
|
| 35 |
+
model = "CodeferSystem/GPT2-Hacker-password-generator-Medium"
|
| 36 |
+
|
| 37 |
+
tokenizer = AutoTokenizer.from_pretrained(model)
|
| 38 |
+
model = AutoModelForCausalLM.from_pretrained(model)
|
| 39 |
+
|
| 40 |
+
prompt = "User: generate a hacker password\nAssistant:"
|
| 41 |
+
|
| 42 |
+
inputs = tokenizer(prompt, return_tensors="pt")
|
| 43 |
+
|
| 44 |
+
output = model.generate(
|
| 45 |
+
**inputs,
|
| 46 |
+
max_length=60,
|
| 47 |
+
do_sample=True,
|
| 48 |
+
temperature=0.9,
|
| 49 |
+
top_p=0.95,
|
| 50 |
+
no_repeat_ngram_size=2
|
| 51 |
+
)
|
| 52 |
+
|
| 53 |
+
print(tokenizer.decode(output[0], skip_special_tokens=True))
|
| 54 |
+
```
|
| 55 |
+
# Example output:
|
| 56 |
+
|
| 57 |
+
```
|
| 58 |
+
(1) User: generate a hacker password
|
| 59 |
+
Assistant: 7-Zs_?~?JNz2
|
| 60 |
+
|
| 61 |
+
(2) User: generate a hacker password
|
| 62 |
+
Assistant: Y>Z7fB&j9c*q<&
|
| 63 |
+
|
| 64 |
+
(3) User: generate a hacker password
|
| 65 |
+
Assistant: #Nc<w~2hfJ4<
|
| 66 |
+
|
| 67 |
+
(4) User: generate a hacker password
|
| 68 |
+
Assistant: Zg0qV%X-!z=j5j
|
| 69 |
+
|
| 70 |
+
(5) User: generate a hacker password
|
| 71 |
+
Assistant: t~5^>6hVhxQ$yY
|
| 72 |
+
```
|
| 73 |
+
|
| 74 |
+
# Small model
|
| 75 |
+
|
| 76 |
+
[GPT2-Hacker-password-generator Small model](https://huggingface.co/CodeferSystem/GPT2-Hacker-password-generator)
|
| 77 |
+
|
| 78 |
+
# Fine-tune data
|
| 79 |
+
The dataset on which the model was trained will be published later.
|