Cyber Manhunt
Release Date: 02.02.2021
Languages: Simplified Chinese, English, Traditional Chinese
Compare the cheapest prices for Cyber Manhunt with bestgameprice.net to find the best deal. Discover where to buy the cheapest Cyber Manhunt PC key. You can also explore Cyber Manhunt system requirements, watch its Twitch streams and see the game stats below.
Game Stats
Cyber Manhunt streams
Frequently Asked Questions
What is the story of Cyber Manhunt?
Where can I download Cyber Manhunt?
Where can I buy Cyber Manhunt?
How many GB is Cyber Manhunt?
What languages does Cyber Manhunt support?
Is there multiplayer in Cyber Manhunt?
When is Cyber Manhunt coming out?
Who is the publisher of the game?
Who is the developer of the game?
About Game
Hello everyone, we are the Aluba Studio, and we are happy to share our game with you that is Cyber Manhunt.
Like this game's name mentions, this is a cyber-puzzle game which is combined with the network of violence, big data, loss of privacy and other social problems.
Many plots of this series game relate to real events. So you can find many familiar stories in your life as Deja-vu scene.
In our creative process, we found that the Internet is more important in our life than everyone's imagination. Social events always have different opinions in the real world. And there is always has a little group of people who enjoy judging others, and because of that, the events would be more complicated, even leading emergencies to happen. When information flow quickly transforms in every place of the world, immorality and illegal news always happen. In this process, more and more people enjoy being judging process.
After careful consideration, we decided to make an amazing game to let people really know about the dangers of internet world. We focus on the dark web, truly cybercrime and privacy burglary, tried to let gamers can experience being a hacker in the real world. Every little operation would affect the life of the characters in the game, which would let you rethink the relationship between people and the internet.
You can do some really hack in our game:
·Web search
You should collect basic information about the targets through the Internet search.
·Database
You can use the database to get deep information about targets.
·Crack
You would get passwords based on the obtained target's information, and use it to log in to accounts of different platforms (including email, social media, chat application, etc.)
·Chat
The exciting thing is that you need to chat with targets by disguise and use the information to get the trust of the target.
·Picture Analysis
You can get valuable information and relevant clues from pictures.
·Phishing
You can send phishing links to hack the targets' hardware devices (computer, mobile phone), and get private information.
More advanced hacking methods will be unlocked later!
·Highly Immersive
Gamers play as a hacker in the game, accepts the commission of the company, and solve dangerous incidents.
·Rich Gameplay
There are lots of features of Social Engineering in the game, which is including Detecting, Tracking, Puzzles-Solving, Destroying and Hacking etc..
·Complex Story
The game will judge the good and evil of the player's behavior. Different judgments will lead to different plot directions.
·Multiple Roles
There are many different roles in this game with a flash of personality. Their stories would be dug by yourself.
When we decided on the subject matter of the game, we thought about it for a long time. Because of This War of Mine, Papers, Please, Orwell and other excellent indie games, we also want to make a game that allows gamers to think outside the game. We tried so many times to brainstorm.
We set up a Social Engineering group to find some experts and ask them about the skills for giving gamers a real hacking experience. We even read the book The Art of Deception written by the famous hacker Kevin David Mitnick to figure out how a real hacker's works. These studies directly opened the door to a new world for all of us. The disciplines involved social engineering, psychology, micro-expressions, phrase skills and so on, which kinds of studies make us have great confidence in the theme of the game and gameplay.
Not just professionals and books, we also get inspiration from cinema. For example, through Who Am I: No System Is Safe, we have seen another explanation about hacking skills. Through Searching we have learned how to create storytelling in details and how to let the audiences and games focus on where we expect them to focus. Every times learning makes us closer to the game in my heart.
So as we mentioned before, this game is very special and unique which combines a lot of creativity. I really hope that you guys could like this game so much. Please feel free to leave your advice and feedback in Community.
Like this game's name mentions, this is a cyber-puzzle game which is combined with the network of violence, big data, loss of privacy and other social problems.
Many plots of this series game relate to real events. So you can find many familiar stories in your life as Deja-vu scene.
Theme
In our creative process, we found that the Internet is more important in our life than everyone's imagination. Social events always have different opinions in the real world. And there is always has a little group of people who enjoy judging others, and because of that, the events would be more complicated, even leading emergencies to happen. When information flow quickly transforms in every place of the world, immorality and illegal news always happen. In this process, more and more people enjoy being judging process.
After careful consideration, we decided to make an amazing game to let people really know about the dangers of internet world. We focus on the dark web, truly cybercrime and privacy burglary, tried to let gamers can experience being a hacker in the real world. Every little operation would affect the life of the characters in the game, which would let you rethink the relationship between people and the internet.
Features
You can do some really hack in our game:
·Web search
You should collect basic information about the targets through the Internet search.
·Database
You can use the database to get deep information about targets.
·Crack
You would get passwords based on the obtained target's information, and use it to log in to accounts of different platforms (including email, social media, chat application, etc.)
·Chat
The exciting thing is that you need to chat with targets by disguise and use the information to get the trust of the target.
·Picture Analysis
You can get valuable information and relevant clues from pictures.
·Phishing
You can send phishing links to hack the targets' hardware devices (computer, mobile phone), and get private information.
More advanced hacking methods will be unlocked later!
Gameplay
·Highly Immersive
Gamers play as a hacker in the game, accepts the commission of the company, and solve dangerous incidents.
·Rich Gameplay
There are lots of features of Social Engineering in the game, which is including Detecting, Tracking, Puzzles-Solving, Destroying and Hacking etc..
·Complex Story
The game will judge the good and evil of the player's behavior. Different judgments will lead to different plot directions.
·Multiple Roles
There are many different roles in this game with a flash of personality. Their stories would be dug by yourself.
Written in the end
When we decided on the subject matter of the game, we thought about it for a long time. Because of This War of Mine, Papers, Please, Orwell and other excellent indie games, we also want to make a game that allows gamers to think outside the game. We tried so many times to brainstorm.
We set up a Social Engineering group to find some experts and ask them about the skills for giving gamers a real hacking experience. We even read the book The Art of Deception written by the famous hacker Kevin David Mitnick to figure out how a real hacker's works. These studies directly opened the door to a new world for all of us. The disciplines involved social engineering, psychology, micro-expressions, phrase skills and so on, which kinds of studies make us have great confidence in the theme of the game and gameplay.
Not just professionals and books, we also get inspiration from cinema. For example, through Who Am I: No System Is Safe, we have seen another explanation about hacking skills. Through Searching we have learned how to create storytelling in details and how to let the audiences and games focus on where we expect them to focus. Every times learning makes us closer to the game in my heart.
So as we mentioned before, this game is very special and unique which combines a lot of creativity. I really hope that you guys could like this game so much. Please feel free to leave your advice and feedback in Community.
Supported Languages: Simplified Chinese, English, Traditional Chinese
System Requirements
Minimum System Requirements:
Minimum:
- OS: Windows 7/8/10
- Processor: Intel(R) Core(TM) i3-3220
- Memory: 4 GB RAM
- Graphics: NVIDIA GeForce GT 610
- DirectX: Version 9.0c
- Storage: 3 GB available space
- Sound Card: 100% DirectX 9.0c compatible sound card
Recommended System Requirements:
Recommended:
- OS: Windows 7/8/10
- Processor: Intel(R) Core(TM) i5-3470
- Memory: 8 GB RAM
- Graphics: NVIDIA GeForce GT 630
- DirectX: Version 9.0c
- Storage: 3 GB available space
- Sound Card: 100% DirectX 9.0c compatible sound card
Comments