- Green versionView
- Green versionView
- Green versionView
Public enemy of the whole networkGame introduction
During the "friendly" communication in the team project meeting, we discovered that when the Internet continues to penetrate people's lives and accelerate the transmission of information, a negative event can quickly spread throughout the entire Internet.
In this process, crimes will be exposed and punished, which will make people happy; but some people will also suffer malicious curses and insults from network keyboard warriors. When these online violence continue to escalate, the consequences often go beyond the incident itself, and some even end their precious lives due to the pressure.
Therefore, we decided to develop a game related to the themes of "hacking", "human flesh" and "private data leakage". We hope that players can play the role of a hacker or social engineer (human flesh) target person and find out their privacy secrets. We hope that through this process, players can think and make their own correct judgments.
Public enemy of the whole networkGame Highlights
1. Players will accept a series of tasks as a top hacker
2. Then use various social engineering techniques to accomplish the goal and find out the truth of the incident
3. In the process of accepting the entrustment from reporters and completing one social work incident after another
4. We need to use a variety of different social engineering methods to achieve our ultimate goal
5. Each different social work method will have corresponding conditions for use.
6. When used successfully, you will get clues
Public enemy of the whole networkGame description
After more than a year of hard work, we have completed part of the game concept, implemented some social engineering (human flesh) methods, and integrated them into our game:
web search
Players collect basic information about the target object through the browser search function.
database
Use known information to enter into the database, and after filtering, there may be other information about the target object.
crack
Generate passwords through the obtained target person information, which can be used to log in to accounts on various platforms (including email, social platforms, chat software, etc.).
Disguise
Obtain the target’s needs, social circle, etc., choose a disguise based on the information, and obtain more information by contacting the target.
chat idioms
After adding the target person as a friend, use chat routines to obtain information.
Image analysis
Obtain valuable information and related clues from pictures.
fishing
Send phishing links to invade the target person’s hardware devices (computers, mobile phones) and obtain private information.
Of course, more advanced social engineering methods will be unlocked later!
Public enemy of the whole networkGame features
Strong sense of immersion
In the fictional world, the player plays the role of a hacker, accepts the commission of a company, completes different social engineering events, and experiences real hacking operations.
Various ways to play
There are multiple systems in the game. In addition to the social engineering system, there are also reasoning, tracking, puzzle solving, destruction and invasion systems that players need to break through one by one.
The plot is complicated
You will face a large number of choices and puzzles in the game, and different choices may lead to different endings.
Many characters
There are many characters, each with their own personality traits, and there are unknown stories behind them. It is up to you, as a hacker, to discover the truth of the events one by one.
Public Enemy Network Update Log
1.Fix some bugs
2. Optimized some functions
特别说明:本站为您提供的全网公敌中文版是steam官方发行平台下载,请支持正版哦~
Huajun editor recommends:
Public Enemy is one of the best software in the industry. I believe that many friends will have used it. If you don’t use it anymore, you will be OUT. This site also prepares for you"Plants vs. Zombies: Garden Warfare",Mount & Blade Fire & Sword,Dancing online PC version,Dr. Mary mini game,Forest Ice and Fire Man 2 Invincible Edition

















Useful
Useful
Useful