> Trailer_
> System_Overview_
Discovery Journey
Dive deep into corrupted servers and uncover the truth hidden beneath layers of secret corporate data.
Command-line Interface
Master authentic terminal commands to bypass security protocols, read database files and navigate through the internal network.
Immersive Investigation
Every logged keystroke matters. Piece together fragmented chat logs, emails, and system records to solve the case.