$ whoami | apt-get-sudo.com

Michael
Galde

Security Researcher · Tool Builder · Educator

Assistant Professor at the University of Arizona. 10+ years in cybersecurity — Army intelligence, ICS security, network forensics, and ML-driven threat detection. This is where the tools and research live.

Professional site → michaelgalde.com

Built Things

Open-source tools for network analysis, visibility, and defense. If it touches packets, it probably ended up here.

HexCheck GitHub

Network visualization tool that renders host relationships and traffic flows as interactive graphs. Built for rapid situational awareness during investigations — feed it a network and see what's actually talking to what.

Python tkinter
PCAPMap GitHub

Parses PCAP files and generates interactive network topology maps from captured traffic. Uses Scapy for packet dissection and NetworkX for graph construction; Bokeh renders the output as a navigable browser visualization.

Python Scapy NetworkX Bokeh
Bee Knees GitHub

Low-interaction honeypot with real-time intrusion notifications. Listens on configurable ports, logs connection metadata and payloads, and pushes alerts on contact. Useful for detecting lateral movement and probing activity on networks you care about.

Python
DropTap GitHub

Network diagnostics tool for quick connectivity and path analysis. Surfaces packet loss, latency distribution, and routing behavior in a format that's actually readable under pressure.

Python
WhisperDrop GitHub

GTK4 graphical front-end for OpenAI Whisper that runs entirely on your machine — drag and drop audio or video files and get a transcript back. Supports MP3, WAV, M4A, FLAC, MP4, MKV, and anything else FFmpeg can read. Output in plain text, SRT/VTT subtitles, TSV, or JSON. No cloud, no subscription, no API key. Audio never leaves the host after the model weights are downloaded once.

C GTK4 OpenAI Whisper FFmpeg Meson Linux x86_64

Current Projects

Research at the intersection of machine learning, network intelligence, and critical infrastructure security — with real stacks, not hypotheticals.

2024 Active

GRID-LM

LLM application for industrial network monitoring. Fine-tuned on OT protocol traffic to interpret BACnet, LonTalk, and Modbus patterns in natural language — bridging the gap between packet-level forensics and analyst-facing reporting in ICS environments.

stack / methodology

Python LLM fine-tuning OT protocols BACnet LonTalk
2024 Active

DaRIA

Adaptive network intelligence agent for dynamic threat detection and response. Operates autonomously across heterogeneous network environments, adjusting detection thresholds based on observed traffic baselines rather than static signatures.

stack / methodology

Python ML Anomaly detection Autonomous agents
2024 – Present Active

SPINE

NLP infrastructure purpose-built for cybersecurity operations. Builds processing pipelines trained on security-domain corpora — threat intel reports, CVE descriptions, SIEM alerts — to support downstream classification, summarization, and triage tasks.

stack / methodology

Python NLP Transformer models Security corpora
2022 – Present Ongoing

IAES-SOC

Python and ML-based OT network monitoring system purpose-built for industrial environment SOCs. Integrates Wazuh SIEM with the ELK stack for centralized alerting and visualization. Focuses on detection fidelity in environments where false positives have operational consequences.

stack / methodology

Python ML Wazuh SIEM ELK stack OT monitoring

Technical Writeups

CTF walkthroughs, research notes, and anything else worth putting in writing.

bash — writeups/
$ ls -la ./writeups/
total 0
drwxr-xr-x  2 mgalde  staff   64 Apr 2026 .
drwxr-xr-x 12 mgalde  staff  384 Apr 2026 ..
$ # Nothing here yet.
Incoming: CTF walkthroughs, ICS research notes, and tool documentation. The directory exists. The content is staging. Check @michaelgalde.com for updates.

Get in Touch

Reach out for research collaboration, tool questions, CTF discussion, or consulting inquiries. For professional and academic work, the full contact info is at michaelgalde.com.