Hi, I’m Shea Polansky

I’m a hacker, sysadmin, software developer, and engineer.


I’m a hacker, sysadmin, and software developer. Most importantly, I am an engineer — that means that I see problems and find solutions. My areas of interest include network, systems, and embedded security, as well as network and systems administration/engineering. The bulk of my professional and hobby security work is done in an offensive context, with occasional software development, usually to create tools that support or enable my other skills. My hobbies are playing video and tabletop games, reading sci-fi and fantasy books, cooking and baking, and dabbling in electrical engineering.

I currently work at Google as a Senior Security Engineer performing Adversary Simulation and Red Team operations. My areas of focus include application, cloud, and hardware security.

This is my personal site, where you can find some information about me, my blog, a list of my projects, and my contact info.


I’ve given a number of talks at various security and tech conferences. Here are some examples (newest first):

I am also a regular participant at an internal lightning talks program. While many of those talks aren’t publishable due to NDAs, here are a few that are:


Latest Post

Jul 1, 2022

I Did Some Classic Router Hacking and Found Some Weird Stuff

A friend of mine got a new router/modem for his Verizon 5G home internet, and he noticed the installation tech visiting a hidden UI that wasn’t available to him. Naturally, we both thought that was unacceptable and set about hacking the router so we could see what secrets it held. We discovered something interesting: the single box contained two separate Linux systems, running a Frankenstein combination of OpenWRT and Android and communicating across a hidden virtual Ethernet link. Read more
All Posts


My full résumé is available by request. Highlights:

  • Skilled at security analysis of all kinds, with particular expertise in networks, applications, systems, and embedded hardware
  • Served as a network, application, and embedded security engineer for various clients in a consulting role
  • Deep knowledge of Windows and Linux internals as well as networking minutiae including TCP/IP stack
  • Familiar with modern applied cryptography
  • Strong technical communication skills including report writing and public speaking
  • Semi-professional electrical engineering skills including circuit design, board layout, and design for manufacturing
  • Capable of building, administering, and troubleshooting computer networks on a variety of hardware and operating systems
  • Experience with devops technologies
  • DEF CON Black Badge holder; member of the winning team of the DEF CON 29 Blacks in Cybersecurity CTF
  • Regular speaker at security and technology conferences as well as for internal lightning talk programs
  • Winner of SANS Core NetWars at RSA Conference, and two-time participant at the NetWars Tournament of Champions
  • Completed the Microcorruption embedded security CTF; globally ranked at number 405 of over 62,000 players.


Feel free to contact me with any questions about any of my projects. You can find the source code, and in some cases binaries, on my GitHub page.

For sensitive communications, I have published keys on this site using the Web Key Directory standard, and on the MIT PGP Key Server. This means that for most implementations of PGP my key will be automatically discovered and used, but you can also find a local mirror of my public key here if you wish to download it manually. You can also import the key using my Keybase profile, or use Keybase Chat.

My current local time is .