◈ HACKTERM v0.5     ▮ SESSION ACTIVE     ⚠ TRACE PROTOCOL: NOMINAL     NODE: ALPHA-7 | 192.168.1.1
 ██╗  ██╗ █████╗  ██████╗██╗  ██╗████████╗███████╗██████╗ ███╗   ███╗
 ██║  ██║██╔══██╗██╔════╝██║ ██╔╝╚══██╔══╝██╔════╝██╔══██╗████╗ ████║
 ███████║███████║██║     █████╔╝    ██║   █████╗  ██████╔╝██╔████╔██║
 ██╔══██║██╔══██║██║     ██╔═██╗    ██║   ██╔══╝  ██╔══██╗██║╚██╔╝██║
 ██║  ██║██║  ██║╚██████╗██║  ██╗   ██║   ███████╗██║  ██║██║ ╚═╝ ██║
 ╚═╝  ╚═╝╚═╝  ╚═╝ ╚═════╝╚═╝  ╚═╝  ╚═╝   ╚══════╝╚═╝  ╚═╝╚═╝     ╚═╝
v 0 . 5 — H A C K I N G P U Z Z L E G A M E
FIND THE KEY  ·  BREACH THE NODE  ·  DON'T GET TRACED

HACKTERM is a terminal-based hacking puzzle game set inside a clandestine digital network. You are an operative connected to NODE ALPHA-7 — your only exit is through AXIOM, a hardened system no one has breached before.

Infiltrate nodes, crack encrypted locks, and evade the TRACE PROTOCOL before it broadcasts your location. Every command is a calculated risk. Every second costs you.

▸ HOW TO PLAY
You start with a terminal and nothing else. Type help to see what commands are available.
Explore. Read everything. Some files are not what they appear to be.
Every action has a consequence — and some will set things in motion you can't undo.
When the TRACE activates, your window closes fast. Move with purpose.
There are no hints. There is no map. Find your own way through.
⚠   UNAUTHORIZED INTRUSION ATTEMPTS ARE LOGGED  ·  TRACE PROTOCOL ACTIVE   ⚠
// SYSTEM.BREACH.LOG
● · ·    root@alpha-7 — hackterm.session                        AES-256
root@alpha-7:~$ connect 10.0.0.23
> [ CONNECTED TO BETA-3 ]

root@BETA-3:~$ scan --targets
> AXIOM 10.0.0.99 — HARDENED  ⚠

⚠ TRACE ACTIVE  |  38s UNTIL BROADCAST  |  EVADÍ EL RASTREO

root@BETA-3:~$ evade --protocol ghost
> Ghost packets injected... OK
> TRACE CLEARED — +15s added

root@BETA-3:~$
// SYSTEM.CAPABILITIES
⬡ INFILTRATION
Tunnel through encrypted nodes. Every hop is a decision. Wrong ones get you traced.
◈ TRACE EVASION
A countdown hunts you. Evade detection, reroute signals, buy seconds before broadcast.
▣ CRYPTO PUZZLES
Crack authentication locks. Decode fragments. Break through hardened firewalls.
◎ ROGUE PROTOCOLS
Hidden commands unlock deeper access. Find what most operatives never reach.
⚡ ZERO-DAY EXPLOITS
Each target has unique defenses. Find the vulnerability before time runs out.
◌ NODE MAPPING
Chart the hidden architecture. Offline nodes and ghost connections hold the key.
// OPERATIVE.MANUAL
help— list all available commands
connect <ip>— tunnel into a target node
scan— discover nodes on the network
evade— attempt to clear trace protocol
exploit <target>— attempt a breach on a hardened node
crack <file>— brute-force an encrypted lock
◈ ALPHA-7  ·  BETA-3  ·  AXIOM  ·  NODE-9
© 2025 ACKISSAETH — HACKTERM v0.5 — ALL SYSTEMS ENCRYPTED

Download

Download NowName your own price

Click download now to get access to the following files:

HACKTERM-v0.5-Windows.zip 110 MB

Leave a comment

Log in with itch.io to leave a comment.