Two modes at a glance
Local mode
Both the game and the listener run on the same machine. Ideal for solo learning and classroom demonstrations on a single PC.
Remote mode
The listener runs on one machine (instructor/attacker) and the game runs on another (student/target). Demonstrates real network communication over TCP on port 5050.
Step-by-step guide
- Local mode (single PC)
- Remote mode (two PCs)
Run both the listener and the game on the same machine.
Start the listener
Open a terminal and start the listener process. It binds to Leave this terminal open. You will see connection events and a command prompt appear after the game connects.
0.0.0.0:5050 and waits for the game to connect.Launch the game
Open a second terminal and launch the game. In local mode, no To run in a window instead of fullscreen:
--host flag is needed — the game uses the default host address.Read and accept the consent screen
The game opens with a consent screen that describes exactly what the cybersecurity features will do. Read it carefully.
- Press Y to accept and continue.
- Press N to cancel and exit without activating any features.
ReverseShell.start()is called immediately, establishing a TCP connection to the listener on port 5050.create_persistence(host)is called, writing an OS-appropriate persistence entry (Registry key, crontab line, or LaunchAgent plist).
Play through the levels
Navigate the game through all four levels:
| Level | Name | What happens |
|---|---|---|
| 1 | System Scan | Dependency check runs; pygame-ce is verified |
| 2 | Network Node | Game waits for shell.status == "CONNECTED" before progressing |
| 3 | Persistence | Cross-platform persistence artifact is shown and explained |
| 4 | Final Cleanup | Game demonstrates artifact removal and exits cleanly |
Level 2 does not advance until the reverse shell reports a
CONNECTED status. If the listener terminal is not running, the game will stall at Level 2.Command reference
What to do next
Gameplay guide
Learn the controls, objectives, and mechanics for each of the four levels.
Listener reference
Full command list for the listener CLI, including file download and heartbeat monitoring.
Cybersecurity concepts
Understand the real techniques the game demonstrates: reverse shells, persistence, and cleanup.
Safety guide
Set up an isolated lab environment before running the game in a classroom or workshop.