top of page
monkey2.jpeg

Guy Shavit

Security Researcher

Certifications:

OSCP, OSWP, CRTP, PORP

CVE's:

Hacking Profiles:

A Bit About Me

I’m Guy Shavit — a cybersecurity researcher and red teamer with a focus on offensive security, exploit development, and vulnerability research. I come from a military cyber background, and hold certifications like OSCP, CRTP, and OSWP. Whether it’s digging into web bugs, building PoCs, or simulating real-world attacks, I’m all about staying hands-on and sharp.

​

Outside of work, you’ll usually find me solving CTFs on platforms like HackTheBox and TryHackMe, lifting at the gym, hiking somewhere remote, strumming my guitar, or just watching the sunset to reset. This blog is my space to share research, tools, techniques, and real stories from the field — straight from my lab to yours.

Work Experience

June 2024 - Present

December 2022 - Present

December 2022 - June 2024

Security Researcher, I conduct advanced penetration testing, reverse engineering, and proof-of-concept (PoC) development across a variety of technologies. My work focus on uncovering vulnerabilities in network protocols, web applications, and IoT devices, often pushing beyond known attack surfaces. I combine hands-on offensive techniques with deep technical research to deliver findings that informed red team operations, product hardening, and CVE-level discoveries.

Cyber Division Professional guidance, In this role, I am responsible for mentoring and guiding teams within the cyber division, focusing on offensive security, red teaming strategies, and operational methodology. I provide hands-on training, developed technical materials, and ensure high standards across missions and internal exercises. This position combines leadership with deep technical expertise, helping shape the next generation of cyber operators while staying embedded in advanced security operations.

Cybersecurity Analyst, I specialized in network traffic analysis using Wireshark, advanced OSINT techniques, and domain-based investigations. I worked on identifying threats across multiple layers, correlating data from various sources, and delivering actionable intelligence. This role sharpened my skills in real-time analysis, threat hunting, and investigative workflows that bridge technical insight with operational impact.

bottom of page