RootKit is a tactical hacking game set inside a corporate honeypot network. Track hostile hackers, infiltrate their systems, steal crypto and data, and eliminate them before they trace your connection.

Inicia sesión para agregar este artículo a tu lista de deseados, seguirlo o marcarlo como ignorado.

No disponible en Español (Latinoamérica)

Este artículo no está disponible en tu idioma. Consulta la lista de idiomas disponibles antes de realizar la compra.

Este juego aún no está disponible en Steam

Próximamente

¿Te interesa?
Agrégalo a tu lista de deseados y recibe una notificación cuando esté disponible.
Agregar a tu lista de deseados
 

Acerca de este juego

RootKit is a tactical hacking game where you operate inside a corporate honeypot network designed to lure and eliminate hostile hackers.

Track targets, breach enemy systems, and exploit their machines before they can trace your connection. Steal sensitive files, cryptocurrency, and deploy destructive virus payloads to wipe hostile systems for bonus rewards. Every second counts as the longer you remain connected, the higher the risk of detection.

Use stolen crypto to purchase upgrades, unlock advanced tools, and refine your tactics. Adapt to rising threat levels, manage escalating countermeasures, and dominate the network before it turns against you.

  • Target Scanning & Threat Selection
    Scan the network to uncover hostile hackers with varying threat levels, rewards, and risks.

  • Tactical System Infiltration
    Break into enemy systems, manage trace levels, and make real time decisions to stay undetected.

  • Multiple Interactive Hacking Challenges
    Face different hacking scenarios and mini games that test speed, accuracy, and strategy.

  • File Theft & Resource Extraction
    Steal files, harvest cryptocurrency, and tag valuable data before systems lock down.

  • Escalating Risk & Counter Hacks
    Enemy hackers fight back as detection rises, triggering defensive countermeasures and takeover attempts.

  • Upgradeable Skills & Tools
    Spend stolen crypto to improve hacking abilities, unlock new skills, and enhance efficiency.

  • Replayable, System Driven Gameplay
    Each session offers different targets, outcomes, and tactical decisions.

Información sobre contenido generado por IA

Los desarrolladores describen cómo sus juegos utilizan contenido generado por IA de esta manera:

This game makes limited use of generative artificial intelligence during development to assist with placeholder content and non critical descriptive text. All gameplay systems, mechanics, progression, and final in game content are designed, authored, and implemented by the developer. No generative AI is used during live gameplay, and no player data is collected or processed by AI systems.

Requisitos del sistema

    Mínimo:
    • Requiere un procesador y un sistema operativo de 64 bits
    • SO: Windows 10 (64-bit)
    • Procesador: Intel Core i3-2100 / AMD FX-4300 or equivalent
    • Memoria: 4 GB de RAM
    • Gráficos: Integrated graphics (Intel HD 4000 or equivalent)
    • DirectX: Versión 11
    • Almacenamiento: 1 GB de espacio disponible
    • Tarjeta de sonido: Any
    • Compatibilidad con RV: N/A
    • Notas adicionales: Low system requirements. Designed to run on modest hardware.
    Recomendado:
    • Requiere un procesador y un sistema operativo de 64 bits
    • SO: Windows 11 (64-bit)
    • Procesador: Intel Core i5 or equivalent
    • Memoria: 8 GB de RAM
    • Gráficos: NVIDIA GeForce GTX 960 / AMD Radeon RX 460 or better
    • DirectX: Versión 11
    • Almacenamiento: 1 GB de espacio disponible
    • Tarjeta de sonido: Any
    • Compatibilidad con RV: N/A
    • Notas adicionales: Optimized for low-to-mid range hardware.
No hay reseñas para este producto

Puedes escribir tu propia reseña sobre este producto para compartir tus experiencias con la comunidad. Utiliza la zona que hay sobre los botones de compra en esta página para escribirla.