You're a hacker. Your handler is Mr. Bob. Your mission: breach North Korea's STAR-7 launch control and redirect their ICBMs to the Moon. Type real commands. Crack WiFi. Exploit servers. Buy tools on the darknet. Every keystroke matters. No one will ever know you were here.

Увійдіть до акаунта, щоби додати цей продукт до списку бажаного чи позначити як ігнорований.

українська мова недоступна

Цей продукт не підтримує вашу мову. Будь ласка, перегляньте список підтримуваних мов перед купівлею.

Ця гра ще не доступна у Steam

Незабаром

Зацікавлені?
Додайте до списку бажаного та дізнайтеся, коли гра вийде.
Додати до бажаного
 

Про цю гру

The World Ends in 72 Hours

Someone has armed its HWASONG-19 ICBMs. Multiple warheads. Multiple targets. Seoul. Tokyo. Possibly more. Diplomacy has failed. A military strike would trigger full-scale war.

That leaves you.

**Black Box - Hacker Day One** is a narrative hacking simulation where you operate a fully diegetic desktop OS. There are no menus, no HUDs, no tutorials floating above the screen. The game *is* the computer. You type commands into a terminal, manage windows, read emails, buy tools from a darknet marketplace, and hack your way through a military network — one exploit at a time.

 

Your Mission: Operation LUNAR REDIRECT

Your handler, **Mr. Bob**, feeds you objectives through a secure messenger. Your predecessor — codename **Ghost** — started this operation but disappeared three days ago. He left files on this machine. Dead drops. Network maps. Everything you need to finish the job.

The plan is insane: breach the DPRK's STAR-7 network and reprogram every rocket's trajectory. The new destination? **The Moon.** The Sea of Tranquility. Zero casualties. The rockets launch, the world panics for a moment, then watches them sail harmlessly into space.

 How It Plays

- **Type real commands** — `ls`, `cd`, `cat`, `ssh`, `nmap`, `exploit`, `decrypt` — in a fully functional terminal emulator

- **Crack WiFi networks** — scan for signals, brute-force passwords, connect to increasingly secure networks

- **Exploit servers** — scan ports, deploy payloads, gain root access, then SSH in to steal files and credentials

- **Buy hacking tools** — spend Bitcoin on WiFi adapters, exploit kits, rootkits, VPNs, password lists, and a zero-day exploit from the darknet market

- **Read enemy communications** — intercept military emails, discover launch codes, and decrypt classified files

- **Cover your tracks** — delete logs, cycle your VPN, evade network traces before they lock onto your position

- **Manage your desktop** — open, minimize, resize, and drag windows just like a real OS

A Desktop That Feels Real

Every element of Project BlackBox exists inside the game world. Your mission briefing arrives via email. Your Bitcoin balance updates in a wallet app. Side quest leads come from darknet contacts. A crypto miner runs in the background. The radio plays music. The clock shows the real time. Mr. Bob types his messages in real-time through a secure messenger on your screen.

There are no cutscenes. No loading screens. No fourth wall. Just you, a terminal, and 72 hours to save the world.

### Five Phases of Escalation

1. **ORIENT** — Learn the OS. Read Ghost's files. Study the network map. Find dead drops.

2. **RECON** — Get online. Scan WiFi. Crack the embassy network. Ping the DPRK gateway.

3. **BREACH** — Exploit the border router. SSH into enemy servers. Find DMZ credentials. Evade a network trace.

4. **ACCESS** — Breach the military command server. Read General Pak's emails. Decrypt classified intel. Steal Bitcoin from a crypto exchange to fund your final weapon.

5. **ENDGAME** — Crack the military relay. Breach launch control. Find the override key. Redirect the rockets. Save the world.

Side Quests and Secrets

Not everything is about the mission. Encrypted emails arrive from mysterious contacts. A Nigerian minister needs a *legitimate* security audit. Your neighbor's WiFi router turns out to be a CIA listening post. Somewhere on a government archive server, there are files about Epstein that probably shouldn't exist. Each side quest pays Bitcoin and reveals more about the world you're operating in.

Key Features

- Fully simulated desktop OS with windowed apps, taskbar, and start menu

- Terminal emulator with 30+ commands and a virtual filesystem

- Five-act narrative driven by handler dialogue and environmental storytelling

- Darknet marketplace with upgradable hacking tools

- WiFi cracking, port scanning, exploit deployment, and SSH access

- Dynamic email inbox with story-driven and timed side quest delivery

- Bitcoin economy — earn from missions, steal from exchanges, spend on tools

- CRT-style visual feedback — screen flashes, shakes, and animations

- Save/load system with auto-save on shutdown

- No hand-holding — figure it out like a real hacker

Розкриття інформації щодо вмісту, згенерованого ШІ

Розробники так описують використання в грі вмісту, згенерованого штучним інтелектом:

Some of the UI elements and store assets like header

Системні вимоги

    Мінімальні:
    • ОС: Windows 10 64-bit
    • Процесор: Intel Core i3 / AMD equivalent
    • Оперативна пам’ять: 4 GB ОП
    • Відеокарта: Any GPU with Vulkan or DirectX 12 support
    • DirectX: версії 12
    • Місце на диску: 1 GB доступного місця
    Рекомендовані:
    • ОС: Windows 10/11 64-bit
    • Процесор: Intel Core i5 / AMD equivalent
    • Оперативна пам’ять: 8 GB ОП
    • Відеокарта: NVIDIA GeForce GTX 1060 / AMD equivalent
    • DirectX: версії 12
    • Місце на диску: 2 GB доступного місця
Немає жодної рецензії на цей продукт

Ви можете написати вашу власну рецензію на цей продукт, щоб поділитися вашим досвідом зі спільнотою. Скористуйтеся полем над кнопками придбання на цій сторінці, щоб написати вашу рецензію.