You're a hacker. Your handler is Mr. Bob. Your mission: breach North Korea's STAR-7 launch control and redirect their ICBMs to the Moon. Type real commands. Crack WiFi. Exploit servers. Buy tools on the darknet. Every keystroke matters. No one will ever know you were here.

Войдите, чтобы добавить этот продукт в список желаемого или скрыть его

Не поддерживается русский язык

Этот продукт не поддерживает ваш язык. Пожалуйста, перед покупкой ознакомьтесь со списком поддерживаемых языков.

Эта игра ещё не доступна в Steam

Скоро выйдет

Заинтересовала игра?
Добавьте её в список желаемого и получите уведомление, когда она выйдет
В желаемое
 

Об этой игре

The World Ends in 72 Hours

Someone has armed its HWASONG-19 ICBMs. Multiple warheads. Multiple targets. Seoul. Tokyo. Possibly more. Diplomacy has failed. A military strike would trigger full-scale war.

That leaves you.

**Black Box - Hacker Day One** is a narrative hacking simulation where you operate a fully diegetic desktop OS. There are no menus, no HUDs, no tutorials floating above the screen. The game *is* the computer. You type commands into a terminal, manage windows, read emails, buy tools from a darknet marketplace, and hack your way through a military network — one exploit at a time.

 

Your Mission: Operation LUNAR REDIRECT

Your handler, **Mr. Bob**, feeds you objectives through a secure messenger. Your predecessor — codename **Ghost** — started this operation but disappeared three days ago. He left files on this machine. Dead drops. Network maps. Everything you need to finish the job.

The plan is insane: breach the DPRK's STAR-7 network and reprogram every rocket's trajectory. The new destination? **The Moon.** The Sea of Tranquility. Zero casualties. The rockets launch, the world panics for a moment, then watches them sail harmlessly into space.

 How It Plays

- **Type real commands** — `ls`, `cd`, `cat`, `ssh`, `nmap`, `exploit`, `decrypt` — in a fully functional terminal emulator

- **Crack WiFi networks** — scan for signals, brute-force passwords, connect to increasingly secure networks

- **Exploit servers** — scan ports, deploy payloads, gain root access, then SSH in to steal files and credentials

- **Buy hacking tools** — spend Bitcoin on WiFi adapters, exploit kits, rootkits, VPNs, password lists, and a zero-day exploit from the darknet market

- **Read enemy communications** — intercept military emails, discover launch codes, and decrypt classified files

- **Cover your tracks** — delete logs, cycle your VPN, evade network traces before they lock onto your position

- **Manage your desktop** — open, minimize, resize, and drag windows just like a real OS

A Desktop That Feels Real

Every element of Project BlackBox exists inside the game world. Your mission briefing arrives via email. Your Bitcoin balance updates in a wallet app. Side quest leads come from darknet contacts. A crypto miner runs in the background. The radio plays music. The clock shows the real time. Mr. Bob types his messages in real-time through a secure messenger on your screen.

There are no cutscenes. No loading screens. No fourth wall. Just you, a terminal, and 72 hours to save the world.

### Five Phases of Escalation

1. **ORIENT** — Learn the OS. Read Ghost's files. Study the network map. Find dead drops.

2. **RECON** — Get online. Scan WiFi. Crack the embassy network. Ping the DPRK gateway.

3. **BREACH** — Exploit the border router. SSH into enemy servers. Find DMZ credentials. Evade a network trace.

4. **ACCESS** — Breach the military command server. Read General Pak's emails. Decrypt classified intel. Steal Bitcoin from a crypto exchange to fund your final weapon.

5. **ENDGAME** — Crack the military relay. Breach launch control. Find the override key. Redirect the rockets. Save the world.

Side Quests and Secrets

Not everything is about the mission. Encrypted emails arrive from mysterious contacts. A Nigerian minister needs a *legitimate* security audit. Your neighbor's WiFi router turns out to be a CIA listening post. Somewhere on a government archive server, there are files about Epstein that probably shouldn't exist. Each side quest pays Bitcoin and reveals more about the world you're operating in.

Key Features

- Fully simulated desktop OS with windowed apps, taskbar, and start menu

- Terminal emulator with 30+ commands and a virtual filesystem

- Five-act narrative driven by handler dialogue and environmental storytelling

- Darknet marketplace with upgradable hacking tools

- WiFi cracking, port scanning, exploit deployment, and SSH access

- Dynamic email inbox with story-driven and timed side quest delivery

- Bitcoin economy — earn from missions, steal from exchanges, spend on tools

- CRT-style visual feedback — screen flashes, shakes, and animations

- Save/load system with auto-save on shutdown

- No hand-holding — figure it out like a real hacker

Информация об ИИ-контенте

Вот как разработчики описывают контент в игре, сгенерированный ИИ:

Some of the UI elements and store assets like header

Системные требования

    Минимальные:
    • ОС: Windows 10 64-bit
    • Процессор: Intel Core i3 / AMD equivalent
    • Оперативная память: 4 GB ОЗУ
    • Видеокарта: Any GPU with Vulkan or DirectX 12 support
    • DirectX: версии 12
    • Место на диске: 1 GB
    Рекомендованные:
    • ОС: Windows 10/11 64-bit
    • Процессор: Intel Core i5 / AMD equivalent
    • Оперативная память: 8 GB ОЗУ
    • Видеокарта: NVIDIA GeForce GTX 1060 / AMD equivalent
    • DirectX: версии 12
    • Место на диске: 2 GB
У этого продукта нет обзоров

Вы можете написать обзор этого продукта, чтобы поделиться своим опытом с сообществом. Для этого воспользуйтесь разделом над кнопками покупки.