recent
أخبار ساخنة

Public enemy

Public enemy

By: Aluba Studio




اللعبة قيد التطوير. قم بالتسجيل المسبق
ليتم إخطارك عندما تكون اللعبة جاهزة للعب

The Game Is Under Development.
Pre-register With Us To be
Notified When The Game Is Ready To Play
age | عمرك

By signing up you agree to our terms of service



"Public Enemy on the Internet" is a plot to decrypt hackers. The player acts as a "hacker" and obtains information about the target character through Internet search and social engineering. All his hobbies, living habits, interpersonal relationships, and the deepest hidden secrets are nowhere to be found. Retreat. There are currently five chapters in the game. Each story seems to be independent, but with the development of the plot, there are grass snakes and gray lines, which are thousands of miles. When all the events are connected in series, there is a shocking secret hidden...

The stories in the game can also see the shadow of social hot topics. I hope that players can reflect on the network itself while playing, and learn to protect personal privacy.

Chapter 1: The Death of the Programmer

The CEO of a certain company committed suicide by jumping off the building, claiming to be blackmailed by his poisoned wife, while his wife posted photos of domestic violence on social networks. There are rumors, who is lying?

Chapter 2: The Invisible Eye

Indecent videos of female college students went viral on the Internet. At this moment, she has already died socially. Who is the instigator? Who should protect the safety of women?

Chapter 3: Evidence of Disappearance

The student council president who was both good in character and learning suddenly disappeared. The bullying incident made the case more complicated and confusing. Who is the murderer and who is the victim?

Chapter 4: The Cost of Humiliation

The giant melon falls from the sky, and the female singer has been exposed again! Intimidation letters, hype, suicides of former women's group members...the Internet is another public opinion carnival!

Chapter 5: Code Immortality

When society is in madness, are you willing to join the code of immortality and gain true love and immortality?

core function:

After more than a year of hard work, we have completed part of the game's conception, realized some network adjustment methods, and incorporated them into our game:

· Web search

The player collects basic information about the target object through the browser search function.

· Database

Use the known information to input into the database, and pass other information about the target object after filtering.

· Crack

Generate a password through the obtained target person information, which is used to log in to the accounts of various platforms (including mailboxes, social platforms, chat software, etc.).

· Disguise

Obtain the needs and social circles of the target object, choose a disguise based on the information, and get more information through contact with the target object.

· Chat communication

After adding the target object as a friend, chat to obtain information.

· Picture Analysis

Get valuable information content and related clues from pictures.

· Of course, more advanced social engineering methods will be unlocked later!

Public enemy
Hossam Galal

تعليقات | Comments

ليست هناك تعليقات
إرسال تعليق
    google-playkhamsatmostaqltradent