Cyber Manhunt is a story-oriented puzzle game focusing on big data, hacking, citizen privacy, and social workers. It focuses on social issues such as cyber violence and privacy breaches.
Recent Reviews:
Overwhelmingly Positive (418) - 95% of the 418 user reviews in the last 30 days are positive.
All Reviews:
Very Positive (2,434) - 93% of the 2,434 user reviews for this game are positive.
Release Date:
Aug 23, 2020
Developer:
Publisher:

Sign in to add this item to your wishlist, follow it, or mark it as not interested

Early Access Game

Get instant access and start playing; get involved with this game as it develops.

Note: This Early Access game is not complete and may or may not change further. If you are not excited to play this game in its current state, then you should wait to see if the game progresses further in development. Learn more

What the developers have to say:

Why Early Access?

“The design and gameplay are innovative and experimental in Cyber Manhunt. We really want to take feedback from players which will help us to improve the content and make it better in future.”

Approximately how long will this game be in Early Access?

“Our target for final release is around 4 months. Before that, we will finish main story and fix major bugs.”

How is the full version planned to differ from the Early Access version?

“There are 4 chapters in Early Access except tutorial, also we will keep appending more content in it. The final version will include all mainly story, more gameplay and characters.”

What is the current state of the Early Access version?

“Early Access is ready to launch. It includes tutorial and 4 chapters, also there are no major bugs.”

Will the game be priced differently during and after Early Access?

“Cyber Manhunt will not change the price when final version is released, but discounts will decrease probability.”

How are you planning on involving the Community in your development process?

“We'll be taking feedback from Steam Community basically, and other multiple social platforms where we can meet players in person and gather their feedback.”
Read more

Download Cyber Manhunt Demo

Buy Cyber Manhunt

 
See all discussions

Report bugs and leave feedback for this game on the discussion boards

Follow Us

There are 4 chapters in Early Access except tutorial. Also we will keep appending more content in it, and some of them will be free of charge!
Please email us if you have any questions or feedback: cmh@mysgame.top

Please kindly note: The demo process can not be used in Early Access.

Facebook: @cybermanhunt
Twitter: @cyber_manhunt

About This Game

Hello everyone, we are Aluba Studios, and we are happy to share our game with you: Cyber Manhunt.
Yes, this is a cyber manhunt games, combined with a network of violence, big data, loss of privacy and other social problems, to the story of puzzle games.
Many of our plot settings refer to real events, so you can also see some familiar figures from some character image setting maps, and you can think of reality after playing the game.

Theme Idea


During the internal communication, we found that when the Internet continues to penetrate people's lives and accelerate the transmission of information, a negative event can quickly spread throughout the Internet.
In this process, sin will be exposed and punished, which will make people happy; but some people will suffer malicious insults and insults from the Internet keyboard man. When these cyber violence continue to escalate, the consequences often exceed the incident itself, and even more stressful and end precious lives.
Therefore, we decided to develop such a game related to the theme of "hacking", "cyber manhunt" and "privacy data leakage". We hope that players can play the role of a hacker, and find out their privacy secrets, like God controls the destiny of others behind his back and witnesses their end. I hope that through this process, players can think and make their own right judgments.

Features


Implemented some cyber manhunt means and integrated them into our game:

·Web search
The player collects basic information about the target object through the browser search function.

·Database
Use known information to enter into the database. After filtering, perhaps other information about the target object.

·Crack
Generate passwords based on the obtained target person information, and use it to log in to accounts on various platforms (including email, social platforms, chat software, etc.)

·Disguise
Obtain the needs, social circles, etc. of the target object, choose disguise according to the information, and get more information by contacting the target object

·Chat Routine
After adding the target object as a friend, perform a chat Routine to get information.

·Picture Analysis
Get valuable information and relevant clues from pictures.

·Phishing
Send phishing links to invade the target person's hardware devices (computer, mobile phone), and obtain private information.

More advanced cyber manhunt methods will be unlocked later!

Gameplay


·Highly Immersive
The player plays a hacker in the game, accepts the commission of a company, and completes cyber manhunt incidents.

·Rich Gameplay
There are a lot of Social Engineering features in the game, also include Reasoning, Tracking, Puzzles-Solving, Destroying and Invading etc..

·Complex Story
The game will judge the good and evil of the player's behavior. Different judgments will trigger the corresponding plot direction.

·Multiple Chars
There are many characters on the stage who has its own personality characteristics and unknown stories. You play a hacker to discover the truth of the incident one by one.

Summary


When we first decided on the theme of the game, we also considered it for a long time. Because of the better independent games such as This War of Mine, Papers, Please and Orwell etc., we also want to make a game that allows players to think outside the game. Therefore, in terms of subject matter, I also racked my brains.
And in order to give players a real hacking experience, we even established a social engineering group to find some professor in the industry and ask them about social engineering. I even read the book The Art of Deception by the famous hacker Kevin David Mitnick, and saw how the real hacker master works. These online and offline learning directly opened the door to a new world for everyone in our team. The disciplines involved include social engineering, psychology, micro-expressions, tactics, etc. The rich content also allows us full of confidence in the subject matter and gameplay of the game.
Not just professionals and books, we are also looking for inspiration in some film works. For example, through Who Am I: No System Is Safe, we have seen more artistic and more representative forms of hacking technology. Through Searching we have learned how to create reversals in details and how let the audience / player focus on where we expect them to focus. Every part of the learning has benefited us a lot, and we can't wait to use them in our games.

To sum up, this game is very special and unique which combines a lot of features. I really hope that you guys could like this game much. Please feel free to leave your messages or feedback in Community.

System Requirements

Windows
Mac OS X
    Minimum:
    • OS: Windows 7/8/10
    • Processor: Intel(R) Core(TM) i3-3220
    • Memory: 4 GB RAM
    • Graphics: NVIDIA GeForce GT 610
    • DirectX: Version 9.0c
    • Storage: 3 GB available space
    • Sound Card: 100% DirectX 9.0c compatible sound card
    Recommended:
    • OS: Windows 7/8/10
    • Processor: Intel(R) Core(TM) i5-3470
    • Memory: 8 GB RAM
    • Graphics: NVIDIA GeForce GT 630
    • DirectX: Version 9.0c
    • Storage: 3 GB available space
    • Sound Card: 100% DirectX 9.0c compatible sound card
    Minimum:
    • OS: OS X 10.8 Mountain Lion
    • Processor: Intel Core i3 2.00 Ghz
    • Memory: 4 GB RAM
    • Graphics: Intel Iris Graphics
    • Storage: 2 GB available space
    Recommended:
    • OS: OS X 10.8 Mountain Lion
    • Processor: Intel Core i3 2.00 Ghz
    • Memory: 4 GB RAM
    • Graphics: Intel Iris Graphics
    • Storage: 2 GB available space

What Curators Say

30 Curators have reviewed this product. Click here to see them.

Customer reviews

Review Type


Purchase Type


Language


Date Range
To view reviews within a date range, please click and drag a selection on a graph above or click on a specific bar.

Show graph



Playtime
Filter reviews by the user's playtime when the review was written:



No minimum to No maximum
Display As:
Show graph
 
Hide graph
 
Filters
Excluding Off-topic Review Activity
Playtime:
There are no more reviews that match the filters set above
Adjust the filters above to see other reviews
Loading reviews...