Hi, I’m Shea Polansky

I’m a hacker, sysadmin, software developer, and engineer.


I’m a hacker, sysadmin, and software developer. Most importantly, I am an engineer — that means that I see problems and find solutions. My areas of interest include network, systems, and embedded security, as well as network and systems administration/engineering. The bulk of my professional and hobby security work is done in an offensive context, with occasional software development, usually to create tools that support or enable my other skills. My hobbies are playing video and tabletop games, reading sci-fi and fantasy books, cooking and baking, and dabbling in electrical engineering.

I currently work at Google as a Senior Security Engineer performing Adversary Simulation and Red Team operations. My areas of focus include application, cloud, and hardware security.

This is my personal site, where you can find some information about me, my blog, a list of my projects, and my contact info.


I’ve given a number of talks at various security and tech conferences. Here are some examples (newest first):

I am also a regular participant at an internal lightning talks program. While many of those talks aren’t publishable due to NDAs, here are a few that are:


Latest Post

Jan 12, 2021

Hacking Keycloak to Support TouchID/FaceID Authentication

Keycloak is an open source identity broker that allows you to combine user credentials from different providers (such as Google OAuth, LDAP, GitLab, etc.) as well as locally-stored credentials into a single authentication provider that can integrate with downstream applications using either SAML2.0 or OpenID Connect. I use it in my home lab as a single sign on provider using local accounts (I gave a talk about my setup at BSides Orlando 2020, check it out if you’re interested! Read more
All Posts


My full résumé is available by request. Highlights:

  • Skilled at security analysis of all kinds, with particular expertise in networks, applications, systems, and embedded hardware
  • Served as a network, application, and embedded security engineer for various clients in a consulting role
  • Deep knowledge of Windows and Linux internals as well as networking minutiae including TCP/IP stack
  • Familiar with modern applied cryptography
  • Strong technical communication skills including report writing and public speaking
  • Semi-professional electrical engineering skills including circuit design, board layout, and design for manufacturing
  • Capable of building, administering, and troubleshooting computer networks on a variety of hardware and operating systems
  • Experience with devops technologies
  • DEF CON Black Badge holder; member of the winning team of the DEF CON 29 Blacks in Cybersecurity CTF
  • Regular speaker at security and technology conferences as well as for internal lightning talk programs
  • Winner of SANS Core NetWars at RSA Conference, and two-time participant at the NetWars Tournament of Champions
  • Completed the Microcorruption embedded security CTF; globally ranked at number 405 of over 62,000 players.


Feel free to contact me with any questions about any of my projects. You can find the source code, and in some cases binaries, on my GitHub page.

For sensitive communications, I have published keys on this site using the Web Key Directory standard, and on the MIT PGP Key Server. This means that for most implementations of PGP my key will be automatically discovered and used, but you can also find a local mirror of my public key here if you wish to download it manually. You can also import the key using my Keybase profile, or use Keybase Chat.

My current local time is .