Hi, I'm Shea Polansky

I'm a hacker, security analyst, sysadmin, and engineer.


I'm a hacker, security analyst, and sysadmin. Most importantly, I am an engineer — that means that I see problems and find solutions. My specialties are in network and systems security, administration, and engineering. I also do application security assessments and general security engineering, as well as software development, usually to create tools that support or enable my other skills. My hobbies are playing video and tabletop games, reading sci-fi and fantasy books, and dabbling in electrical engineering.

I do application, network, and systems security assessments and engineering for Independent Security Evaluators, a security consultancy. As part of my work, I publish blog posts whenever I have interesting findings or useful advice to share. You can find them on my blog. The posts that are directly relevant to my work are also published on ISE's blog.

This is my personal site, where you can find some information about me, a list of my projects, and my contact info.


Latest Post

Dec 3, 2019

A Better Windows 10+WSL SSH Experience

Windows 10 ships with two awesome features for users and developers who still work in Linux land. The first is the Windows Subsystem for Linux, which implements a subset of the Linux Kernel's system calls to allow you to run native Linux userland utilities such as bash and friends, and ssh. Windows 10 also includes a native build of OpenSSH, which means you don't even need to use WSL to SSH into your other machines! Read more


My full résumé is available by request. Highlights:


  • Achieved the Offensive Security Certified Professional (OSCP) certification in 2019
  • Graduated summa cum laude from the University of New Mexico with a BS in Computer Science in 2018
  • Studied abroad for a year at Waseda University, one of Japan's top 3 universities
  • Graduated with a double minor in mathematics and interdisciplinary liberal arts


  • Skilled at security analysis of all kinds including networks, applications, systems, and embedded hardware
  • Deep knowledge of Windows and Linux internals
  • Capable of building, administering, and troubleshooting computer networks on a variety of hardware and operating systems
  • Strong technical communication skills including report writing and public speaking


  • Winner of SANS Core NetWars at RSA Conference, and two-time participant at the NetWars Tournament of Champions
  • Spoke at ToorCon 21 on how to use the Burp HTTP Mock extension.
  • Completed the Microcorruption embedded security CTF; globally ranked at number 405 of over 62,000 players.
  • Recipient of the National Merit Scholarship


Feel free to contact me with any questions about any of my projects. You can find the source code, and in some cases binaries, on my Github page.

I am available for ongoing and project-based consulting work; I am not currently looking for a new job, but if you think you have a particularly good offer or fit for me, please send me the details.

For sensitive communications, I have published keys on this site using the Web Key Directory standard, and on the MIT PGP Key Server. This means that for most implementations of PGP my key will be automatically discovered and used, but you can also find a local mirror of my public key here if you wish to download it manually. You can also import the key using my Keybase profile, or use Keybase Chat.

My current local time is .