Get In Touch

Interested in cybersecurity collaboration, have questions about my projects, or want to discuss security research? Feel free to reach out using any of the methods below.

Connection Secure : Encrypted connection established
Encrypted Communication

Contact Information

Email

For general inquiries and collaboration

hello@pandeyranjit.com.np

Security Reports

For vulnerability disclosures and security issues

security@pandeyranjit.com.np

For responsible disclosure only

GitHub

For project collaboration and code reviews

github.com/lykos3

LinkedIn

For professional networking

linkedin.com/in/lykos3

End-to-End Encryption Available

For sensitive communications, please use my PGP key below

PGP Public Key

Fingerprint: 4A6F A5B8 9C2D 1E3F 5A7B 8C9D 0E1F 2A3B 4C5D 6E7F

-----BEGIN PGP PUBLIC KEY BLOCK----- mQINBF5Ql2sBEAC6LqIMqT7p+uLdG9CCr0mG7S8wR0aJ5iK8vZK8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y z7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Yz7XqJ5Kk8W9j5vH7Q1x4Y =ABCD -----END PGP PUBLIC KEY BLOCK-----

Send a Message

Security Notice

This form uses HTTPS encryption. For highly sensitive information, please use PGP encryption with the key provided.

Security check: What is 7 + 3?

Your message will be encrypted in transit

Response Time

I typically respond within 24-48 hours. For urgent security matters, please use the security email.

Fast Response
Average response time: 12 hours

Communication Guidelines

For Security Researchers

If you've found a security vulnerability, please use the security email and include detailed steps to reproduce. I follow responsible disclosure practices.

For Collaborators

Include links to your GitHub/LinkedIn and specific areas you'd like to collaborate on. I'm particularly interested in open-source security tools.

For Students

I'm happy to help with cybersecurity learning paths and project guidance. Please be specific about what you're learning and what help you need.

Ready to Connect?

Whether you have a project in mind, found a security issue, or just want to chat about cybersecurity, I'm always interested in connecting with fellow security enthusiasts.