Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks