Zero Trust
هل جهازي يشغل لعبة Zero Trust
اعرف ما إذا كان جهازك قادرًا على تشغيل هذه اللعبة من خلال مراجعة الحد الأدنى والمتطلبات الموصى بها بالأسفل.
تفاصيل اللعبة
الحد الأدنى من المتطلبات
المتطلبات الموصى بها
وصف اللعبة
Welcome to the world of hacking.
Choose your path — will you be a White Hat, cooperating with law enforcement and hunting down cybercriminals? A Black Hat, chasing profit and infamy in the digital underworld? Or a Grey Hat, playing both sides as a double agent? The choice is yours.
Hack Your Way
There's no single path to success. Bypass security systems, exploit vulnerabilities, craft custom viruses and software, deploy phishing attacks, or combine techniques to find your own approach. Analyze defensive systems, discover bugs and weaknesses, and use them to your advantage.
A Living, Breathing World
Everything is simulated. Companies run real operations — generating files, sending internal emails, updating systems. Administrators remind employees to change passwords. NPC hackers pursue the same goals as you — and they can hack you or report you to the authorities. Nothing happens by chance. Every playthrough is unique.
Law Enforcement Is Watching
Multiple agencies work to stop cybercriminals. They monitor the network, deploy honeypots, and investigate breaches. If you walk the dark path, you'll need to cover your tracks or risk getting caught. Or join their ranks and help bring hackers to justice.
Build Your Arsenal
Create your own unique tools tailored to your needs. Craft programs, develop exploits, and build viruses — then sell them on the TOR network or use them for your missions. Buy and trade on the dark web marketplace where anything goes.
Money Moves
A full financial system with banks, cryptocurrencies, exchanges, and mixers. Earn money through missions, sell your tools and stolen data, or collect bounties on infamous hackers. Multiple paths to building your fortune.
Upgrade Your Rig
Start with a basic PC and upgrade your hardware over time. Better speeds, more processing power, and the ability to handle increasingly demanding tasks as you climb the ranks.
Built for Fun, Grounded in Reality
Hacking is based on real concepts — complete with a fully functional command line — but designed to be fun first. The perfect blend of realism and entertainment for any aspiring hacker.