over header Product page -wow
Kinguin logo

Welcome home, player!

By clicking Continue with Google or Facebook, you agree to Kinguin's Terms & Conditions and Privacy Policy, also to NFT Terms & Conditions and NFT Privacy Policy.

New to Kinguin?
Sign up now!
  • FAQ
(0 Reviews)
Platform
Steam
Steam
Steam
Steam
Edition

Cyber Manhunt Steam CD Key

Sold by
GamingWorld
99.17% of 3151847 ratings are superb!
9 more offers available starting from
$4.36
Your transaction is secure
We're working hard to protect the security of your payments. We have a dedicated Fraud Prevention and Response Department working 24/7 to ensure safe transactions. We have implemented custom systems to screen out potential scammers and we have partnered with Ravelin, one of the world's best fraud prevention platforms. We don't share your payment details with third-party sellers and we don't sell your information with others.
Key activation
Languages
Release date: 24/08/2020

During the internal communication, we found that when the Internet continues to penetrate people's lives and accelerate the transmission of information, a negative event can quickly spread throughout the Internet.
In this process, sin will be exposed and punished, which will make people happy; but some people will suffer malicious insults and insults from the Internet keyboard man. When these cyber violence continue to escalate, the consequences often exceed the incident itself, and even more stressful and end precious lives.
Therefore, we decided to develop such a game related to the theme of "hacking", "cyber manhunt" and "privacy data leakage". We hope that players can play the role of a hacker, and find out their privacy secrets, like God controls the destiny of others behind his back and witnesses their end. I hope that through this process, players can think and make their own right judgments.
Features

Implemented some cyber manhunt means and integrated them into our game:

  • Web search
    The player collects basic information about the target object through the browser search function.
  • Database
    Use known information to enter into the database. After filtering, perhaps other information about the target object.
  • Crack
    Generate passwords based on the obtained target person information, and use it to log in to accounts on various platforms (including email, social platforms, chat software, etc.)
  • Disguise
    Obtain the needs, social circles, etc. of the target object, choose disguise according to the information, and get more information by contacting the target object
  • Chat Routine
    After adding the target object as a friend, perform a chat Routine to get information.
  • Picture Analysis
    Get valuable information and relevant clues from pictures.
  • Phishing
    Send phishing links to invade the target person's hardware devices (computer, mobile phone), and obtain private information.

More advanced cyber manhunt methods will be unlocked later!
Gameplay

  • Highly Immersive
    The player plays a hacker in the game, accepts the commission of a company, and completes cyber manhunt incidents.
  • Rich Gameplay
    There are a lot of Social Engineering features in the game, also include Reasoning, Tracking, Puzzles-Solving, Destroying and Invading etc..
  • Complex Story
    The game will judge the good and evil of the player's behavior. Different judgments will trigger the corresponding plot direction.
  • Multiple Chars
    There are many characters on the stage who has its own personality characteristics and unknown stories. You play a hacker to discover the truth of the incident one by one.

Summary

When we first decided on the theme of the game, we also considered it for a long time. Because of the better independent games such as This War of Mine, Papers, Please and Orwell etc., we also want to make a game that allows players to think outside the game. Therefore, in terms of subject matter, I also racked my brains.
And in order to give players a real hacking experience, we even established a social engineering group to find some professor in the industry and ask them about social engineering. I even read the book The Art of Deception by the famous hacker Kevin David Mitnick, and saw how the real hacker master works. These online and offline learning directly opened the door to a new world for everyone in our team. The disciplines involved include social engineering, psychology, micro-expressions, tactics, etc. The rich content also allows us full of confidence in the subject matter and gameplay of the game.
Not just professionals and books, we are also looking for inspiration in some film works. For example, through Who Am I: No System Is Safe, we have seen more artistic and more representative forms of hacking technology. Through Searching we have learned how to create reversals in details and how let the audience / player focus on where we expect them to focus. Every part of the learning has benefited us a lot, and we can't wait to use them in our games.

To sum up, this game is very special and unique which combines a lot of features. I really hope that you guys could like this game much. Please feel free to leave your messages or feedback in Community.

Product Rating