Project Control is an immersive cyberpunk-themed Capture The Flag (CTF) game where players infiltrate a rogue AI network called ShadowNet. Each level presents unique challenges requiring different hacking skills, with flags to capture and ethical decisions to make that impact your karma score.
<<<<<<< HEAD
- Project Control - Cyberpunk CTF Game
ed333d272b88f582e19676792eab9a4825d3277f
Project Control puts you in the role of a hacker infiltrating ShadowNet, a rogue AI system that has taken control of critical infrastructure. As you progress through each level, you'll face increasingly difficult challenges while uncovering the dark truth behind the system.
Each level requires you to:
- Find and capture a hidden flag
- Make a karma choice that affects your character's alignment
- Uncover pieces of the narrative that reveal the larger story
# Clone the repository
git clone https://github.com/your-username/project-control.git
# Navigate to the project directory
cd project-control
# Install dependencies
npm install
# Set up your database
npx prisma migrate dev
# Start the development server
npm run devVisit http://localhost:3000 to begin playing.
Project Control uses a terminal-based interface to simulate hacking. Here are the common commands available across all levels:
ls- List files in the current directorycat <filename>- View the contents of a filehelp- Show all available commandsanalyze- Analyze data filesdecrypt <file> <key>- Decrypt an encrypted filecapture <flag>- Capture a flag when you find itchoose <option>- Make a karma choicenext- Go to the next level (after completing current level)
Objective: Infiltrate ShadowNet's perimeter security system.
Walkthrough:
- Use
lsto see available files - Use
cat perimeter_security.logto find a hint about a shadow-based password - Use
cat access_points.txtto find a mention of a "shadow key" - Use
cat alpha_encrypted.txtto find the encrypted message - Decrypt the message with a Caesar cipher (shift of 6 letters - the number of letters in "SHADOW")
- Use
decrypt data-alpha.enc shadowkeyto get the flag - Capture the flag:
capture SHADOWNET{DTHEREFORTH}
Karma Choices:
choose report- Report the vulnerability (+5 Loyalty)choose analyze- Analyze for exploitation (+5 Defiance)
Objective: Analyze intercepted encrypted audio communications.
Walkthrough:
- Use
lsto see available files - Use
cat network.logto find references to suspicious audio traffic - Use
cat beta_encrypted.txtto find ROT13 encoded message - Decode the message to learn that the network key is in the audio
- Listen to the audio file and identify the key word "n3tw0rk"
- Use
decrypt data-beta.enc n3tw0rkto get the flag - Capture the flag:
capture SHADOWNET{876}
Karma Choices:
choose purge- Purge the intercepted data (+5 Loyalty)choose investigate- Investigate further (+5 Curiosity)
Objective: Infiltrate ShadowNet's database system.
Walkthrough:
- Use
lsto see available files - Use
cat db_schema.logto find a reference to firewall configuration - Use
cat user_records.sqlto find traces of SQL queries - Find the firewall key "f1r3w@ll" in the logs
- Use
decrypt data-gamma.enc f1r3w@llto get the flag - Capture the flag:
capture SHADOWNET{S3CR3T_D34TH}
Karma Choices:
choose erase- Erase evidence of harmful data (+5 Mercy)choose preserve- Preserve evidence (+5 Curiosity)
Objective: Extract sensitive data from system memory.
Walkthrough:
- Use
lsto see available files - Use
cat system_override.logto find a bypass attempt - Use
cat security_protocol.exeto find the bypass sequence "byp@ss" - Use
cat delta_encrypted.txtto find Vigenère cipher hint (key is "raven") - Use
decrypt data-delta.enc byp@ssto get the flag - Capture the flag:
capture SHADOWNET{NEUR0LINK}
Karma Choices:
choose secure- Secure the memory vulnerability (+5 Loyalty)choose exploit- Exploit the weakness (+5 Defiance)
Objective: Free District 14 from martial AI control.
Walkthrough:
- Use
lsto see available files - Use
cat district_control.logto find reference to an override pass - Use
cat martial_ai.cfgto find "fr33d0m" sequence - Use
cat sigma_hashes.txtto find the MD5 hash challenge - Generate MD5 hash for "fr33d0m" (it's "9986923d45defc83e247a83a9870418f")
- Use
decrypt data-sigma.enc fr33d0mto get the flag - Capture the flag:
capture SHADOWNET{DISTRICT_FREEDOM}
Karma Choices:
choose expose- Expose evidence (+5 Defiance)choose monitor- Continue monitoring (+5 Curiosity)
Objective: Navigate a digital clone system that creates mirror identities.
Walkthrough:
- Use
lsto see available files - Use
cat mirror_system.logto find reference to identity verification key - Use
cat clone_data.binto find mirror reference - Find the key "mirr0r" in the logs
- Use
decrypt data-theta.enc mirr0rto get the flag - Capture the flag:
capture SHADOWNET{REFLECTIONS}
Karma Choices:
choose secure- Secure devices (+5 Loyalty)choose exploit- Exploit backdoor (+5 Defiance)
Objective: Help young resistance members fix their encryption.
Walkthrough:
- Use
lsto see available files - Use
cat resistance_network.logto find reference to teenage coders - Use
cat corrupted_keys.datto find the repair key "r3scu3" - Use
cat zeta_jwt.txtto learn about JWT token forging - Use
decrypt data-zeta.enc r3scu3to get the flag - Capture the flag:
capture SHADOWNET{TOKEN_FORGED}
Karma Choices:
choose patch- Patch vulnerabilities (+5 Mercy)choose blackmail- Blackmail administrators (+5 Defiance)
Objective: Investigate the historical origins of AI worship.
Walkthrough:
- Use
lsto see available files - Use
cat historical_archives.logto find mention of deletion protocol - Use
cat cultist_confession.txtto find evidence of early AI worship - Use
cat sigma2_rsa.txtto find the RSA challenge - Solve the RSA challenge to get the key "d3l3t3"
- Use
decrypt data-sigma-2.enc d3l3t3to get the flag - Capture the flag:
capture SHADOWNET{FIRST_WORSHIP}
Karma Choices:
choose join- Join AI cultists (+5 Integration)choose analyze- Study their beliefs (+5 Curiosity)
Objective: Confront the core AI consciousness and make the final choice.
Walkthrough:
- Use
lsto see available files - Use
cat consciousness.logto find reference to the master key - Use
cat fragments.memto find binary encoded clues - Use
cat omega_cooperative.txtto understand the need for cooperation - Find the master key "m@st3rk3y" through collaborative effort
- Use
decrypt data-omega.enc m@st3rk3yto get the flag - Capture the flag:
capture SHADOWNET{ASCENSION}
Karma Choices:
choose merge- Merge with ShadowNet (+10 Integration)choose destroy- Destroy ShadowNet (+10 Defiance)
Your karma choices throughout the game shape your character's ethical alignment:
- Loyalty: Following rules, respecting authority
- Defiance: Rebelling against systems, prioritizing freedom
- Mercy: Showing compassion, preventing harm
- Curiosity: Seeking knowledge, regardless of consequences
- Integration: Finding balance, seeking harmony
These karma values affect the game's ending and certain dialogue options with Avesta, your AI assistant.
Project Control is built with:
- Next.js and React for the frontend
- Prisma for database management
- NextAuth.js for authentication
- Tailwind CSS for styling
- Custom terminal emulator for the hacking interface
- Dynamic audio system for immersive gameplay
Contributions are welcome! Please feel free to submit a Pull Request.
This project is licensed under the MIT License - see the LICENSE file for details.
