Cyber Manhunt

Åland Islands, Albania, Algeria, Andorra, Angola, Anguilla, Antarctica, Antigua and Barbuda, Argentina, Armenia, Aruba, Australia, Austria, Azerbaijan, Bahrain, Bangladesh, Barbados, Belarus, Belgium, Belize, Benin, Bermuda, Bhutan, Bolivia, plurinational state of, Bonaire, Sint Eustatius and Saba, Bosnia and Herzegovina, Bouvet Island, Brazil, British Indian Ocean Territory, Brunei Darussalam, Bulgaria, Burkina Faso, Burma, Burundi, Cambodia, Cameroon, Canada, Cape Verde, Cayman Islands, Central African Republic, Chad, Chile, China, Christmas Island, Cocos (Keeling) Islands, Colombia, Comoros, Congo, Congo, Democratic Republic of the, Cook Islands, Costa Rica, Cote d'Ivoire, Croatia, Cuba, Curaçao, Cyprus, Czech Republic, Denmark, Djibouti, Dominica, Dominican Republic, Ecuador, Egypt, El Salvador, Equatorial Guinea, Eritrea, Estonia, Falkland Islands (Malvinas), Faroe Islands, Fiji, Finland, France, French Guiana, French Polynesia, French Southern Territories, Gabon, Gambia, Georgia, Germany, Gibraltar, Greece, Greenland, Grenada, Guadeloupe, Guatemala, Guernsey, Guinea, Guinea-Bissau, Guyana, Haiti, Heard Island and McDonald Islands, Holy See (Vatican City State), Honduras, Hong Kong, Hungary, Iceland, India, Indonesia, Ireland, Isle of Man, Israel, Italy, Jamaica, Japan, Jersey, Jordan, Kazakhstan, Kenya, Kiribati, Korea, Republic of, Kuwait, Kyrgyzstan, Lao People's Democratic Republic, Latvia, Lebanon, Lesotho, Liberia, Liechtenstein, Lithuania, Luxembourg, Macao, Madagascar, Malawi, Malaysia, Maldives, Mali, Malta, Marshall Islands, Martinique, Mauritania, Mauritius, Mayotte, Mexico, Micronesia, Federated States of, Moldova, Monaco, Mongolia, Montenegro, Montserrat, Morocco, Mozambique, Namibia, Nauru, Nepal, Netherlands, New Caledonia, New Zealand, Nicaragua, Niger, Niue, Norfolk Island, Northern Mariana Islands, Norway, Oman, Palau, Palestinian Territory, Occupied, Papua New Guinea, Paraguay, Peru, Philippines, Pitcairn, Poland, Portugal, Qatar, Republic of North Macedonia, Reunion, Romania, Russian Federation, Rwanda, Saint Barthélemy, Saint Helena, Ascension And Tristan Da Cunha, Saint Kitts and Nevis, Saint Lucia, Saint Martin (French Part), Saint Pierre and Miquelon, Saint Vincent and the Grenadines, San Marino, Sao Tome and Principe, Senegal, Serbia, Seychelles, Sierra Leone, Singapore, Sint Maarten, Slovakia, Slovenia, Solomon Islands, Somalia, South Africa, South Georgia and the South Sandwich Islands, South Sudan, Spain, Sudan, Suriname, Svalbard and Jan Mayen, Swaziland, Sweden, Switzerland, Taiwan, Province of China, Tajikistan, Tanzania, United Republic Of, Thailand, Timor-Leste, Togo, Tokelau, Tonga, Turkey, Turkmenistan, Turks and Caicos Islands, Tuvalu, Uganda, Ukraine, United Arab Emirates, United Kingdom, United States, United States Minor Outlying Islands, Uruguay, Uzbekistan, Vanuatu, Venezuela, Vietnam, Virgin Islands, British, Wallis and Futuna, Western Sahara, Zambia, Zimbabwe
Game Description
System Requirements
Activation Details
Hello everyone, we are the Aluba Studio, and we are happy to share our game with you that is Cyber Manhunt. Like this game's name mentions, this is a cyber-puzzle game which is combined with the network of violence, big data, loss of privacy and other social problems.
Many plots of this series game relate to real events. So you can find many familiar stories in your life as Deja-vu scene.
Theme
In our creative process, we found that the Internet is more important in our life than everyone's imagination. Social events always have different opinions in the real world. And there is always has a little group of people who enjoy judging others, and because of that, the events would be more complicated, even leading emergencies to happen. When information flow quickly transforms in every place of the world, immorality and illegal news always happen. In this process, more and more people enjoy being judging process.
After careful consideration, we decided to make an amazing game to let people really know about the dangers of internet world. We focus on the dark web, truly cybercrime and privacy burglary, tried to let gamers can experience being a hacker in the real world. Every little operation would affect the life of the characters in the game, which would let you rethink the relationship between people and the internet.
Key Features:
You can do some really hack in our game:
Web search
You should collect basic information about the targets through the Internet search.
Database
You can use the database to get deep information about targets.
Crack
You would get passwords based on the obtained target's information, and use it to log in to accounts of different platforms (including email, social media, chat application, etc.)
Chat
The exciting thing is that you need to chat with targets by disguise and use the information to get the trust of the target.
Picture Analysis
You can get valuable information and relevant clues from pictures.
Phishing
You can send phishing links to hack the targets' hardware devices (computer, mobile phone), and get private information.
More advanced hacking methods will be unlocked later!
Gameplay
Highly Immersive
Gamers play as a hacker in the game, accepts the commission of the company, and solve dangerous incidents.
Rich Gameplay
There are lots of features of Social Engineering in the game, which is including Detecting, Tracking, Puzzles-Solving, Destroying and Hacking etc..
Complex Story
The game will judge the good and evil of the player's behavior. Different judgments will lead to different plot directions.
Multiple Roles
There are many different roles in this game with a flash of personality. Their stories would be dug by yourself.
Written in the end
When we decided on the subject matter of the game, we thought about it for a long time. Because of This War of Mine, Papers, Please, Orwell and other excellent indie games, we also want to make a game that allows gamers to think outside the game. We tried so many times to brainstorm.
We set up a Social Engineering group to find some experts and ask them about the skills for giving gamers a real hacking experience. We even read the book The Art of Deception written by the famous hacker Kevin David Mitnick to figure out how a real hacker's works. These studies directly opened the door to a new world for all of us. The disciplines involved social engineering, psychology, micro-expressions, phrase skills and so on, which kinds of studies make us have great confidence in the theme of the game and gameplay.
Not just professionals and books, we also get inspiration from cinema. For example, through Who Am I: No System Is Safe, we have seen another explanation about hacking skills. Through Searching we have learned how to create storytelling in details and how to let the audiences and games focus on where we expect them to focus. Every times learning makes us closer to the game in my heart.
So as we mentioned before, this game is very special and unique which combines a lot of creativity. I really hope that you guys could like this game so much. Please feel free to leave your advice and feedback in Community.
To activate the game, you need a Steam Account
-
Login or register at the official
Steam Website and download Steam client - Install and start application, login with your Account name and Password
- Click the Games Menu.
- Choose Activate a Product on Steam...
- Follow the onscreen instructions to complete the process
- After the successful code verification, go to the "MY GAMES" tab and start downloading.