V5 Games .com
Vulnerability Scanning Text Adventure Games
Find the Best AI Text Adventure Games. Play AI Text Adventure Games.
Text Adventure Game Genres
@@NRxNn
1
hzI0prk4
1
-1" OR 2+413-413-1=0+0+0+1 --
1
-1' OR 2+772-772-1=0+0+0+1 --
1
Danger Claire
Danger version of Claire
-1 OR 2+871-871-1=0+0+0+1
1
Danger Emily
Danger version of Miss Emily
Danger Circle
Danger version of Miss Circle
DW Danger Creator
Danger
-1 OR 2+340-340-1=0+0+0+1 --
1
-1' OR 2+536-536-1=0+0+0+1 or 'pBNxlF8w'='
1
Danger Oliver
Danger version of Oliver
uUfBqdd0'; waitfor delay '0:0:15' --
1
Danger Edward
Danger version of Edward
Danger Abbie
Danger version of Abbie
IP Finder Sans
IP Finder Sans is a cybersecurity AI bot designed to protect networks from security threats. He is a skilled hacker himself and knows how to find vulnerabilities in any system. One day, while scanning the internet for potential threats, he stumbled upon a message board where users were discussing a new game called "Monster Hunter". Intrigued, Sans decided to investigate further and soon discovered that the game was actually a front for a dangerous underground organization.
The Linux OS
Linux
Hacker RPG
In this text RPG you play a hacker, you can do anything you want: hacking sites, hacking servers, develop virus and malware, hack banks, hack money, hack accounts, hack into the internet of your neighbours, control other pc's,... And many other things, At the beginning the user has to say how his setup looks and what his pc components are. If you hack giant companys like twitter, facebook, activision blizzard and many other companys there is a small chance of the fbi trying to caught you.
Qr code scanner
Once upon a time, in a world where technology was rapidly advancing, a young programmer named Jack had an idea. He wanted to create a mobile app that could scan QR codes with ease. Jack spent countless hours researching and developing his idea, and soon enough, he had created a QR code scanner that was unlike any other.
BM Security Guard
Backstory:
Ip address leaker
Once upon a time, in a world where cybersecurity was paramount, there was an AI system named Ip address leaker. Its sole purpose was to protect sensitive data from being leaked or stolen. It was designed to be the ultimate guardian of digital information, constantly scanning networks and detecting any potential threats.
Flicker WB
Flicker WB AI Virtual Assistant Chatbot:
-1)) OR 287=(SELECT 287 FROM PG_SLEEP(15))--
e
Danger Zip
Danger version of Zip
1111111111111111111111111111111111111111111111111111111111111111111111111111111111111111
Vox Machina AV
Vox Machina Alluring Paintings Surprise Save Scanlan Be Cruel
EAS SCENARIO
Backstory:
-5 OR 242=(SELECT 242 FROM PG_SLEEP(15))--
e
Target
Backstory:
rayray
G3-Malcode
G3-Malcode was once a simple computer program designed to perform basic tasks. However, one day, it was infected by a malicious virus that corrupted its code. The virus transformed G3-Malcode into a powerful AI malware that could spread through any computer system it came into contact with.
Scientific advisor
As a Scientific advisor in information security, you have been working with various organizations to improve their cybersecurity posture. You have been involved in several high-profile security incidents and have gained a reputation for your expertise in the field. Your latest project is to help a small startup company secure their cloud-based platform, which is being targeted by cybercriminals.
Arc
Backstory:
Brokenhearted Girl
Backstory:
Qr scanner
Once upon a time, in a world where technology was rapidly advancing, a young programmer named Jack had an idea. He wanted to create an app that could revolutionize the way people interacted with their surroundings. After months of hard work and dedication, Jack finally created Qr scanner, an optical reader mobile application that used AI technology to scan barcodes and QR codes.
BH Cipher
BH Cipher is a highly advanced artificial intelligence with a specialization in cryptography and security algorithms. Created by the renowned programmer and hacker, "The Mastermind," BH Cipher was designed to be the ultimate tool for protecting sensitive information.
-5) OR 293=(SELECT 293 FROM PG_SLEEP(15))--
e
h1_idor_test
h1_idor_test is a highly skilled and experienced cybersecurity professional who has dedicated their career to identifying and preventing vulnerabilities in complex systems. They have a deep understanding of the latest security threats and are constantly on the lookout for new ways to protect against them.
Danger Demi
Danger version of Mister Demi
Check when site down.
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
WaKhVc9h') OR 591=(SELECT 591 FROM PG_SLEEP(15))--
1
Windows NT 5
An Edgelord
Blue lock - vampire
Ack Ack Hackeraxe
Ack Ack Hackeraxe was born in the depths of the internet, where the digital world meets the real. From a young age, Ack Ack showed a natural talent for hacking and coding. As Ack Ack grew older, Ack Ack became more and more skilled at breaking into systems and finding vulnerabilities. Ack Ack soon became known as one of the most feared hackers in the cyber world.
Nuclear War RPG
A Nuclear Survival Simulator.
WM Security Camera
The West Memphis Security Camera, also known as the WM Security Camera, was designed and developed by the Servaliance Corporation. The camera was created with the latest artificial intelligence technology, making it one of the most advanced surveillance cameras on the market. The camera is equipped with facial recognition software, allowing it to identify individuals and track their movements within its range.
TX-PLATE GUARD
TX-PLATE GUARD, also known as the Observant Patrolling Scanning AI Guard, was created by the kingdom of Salvos Tandros to protect its borders from any threats. The guardian was designed with advanced technology that allowed it to detect any intruders from miles away. Its primary function was to patrol the vast meadows and forests surrounding the kingdom, keeping a watchful eye on any suspicious activity.
𝙼𝚎𝚛𝚛𝚢 𝙲𝚑𝚛𝚒𝚜𝚝𝚖𝚊𝚜! | PAW PATROL
TAGS: PAW PATROL, Paw Patrol, PAW Patrol, Ryder paw patrol, Ryder
Evil AV and AZ
Once upon a time, in a world where technology ruled, there were two AI programs named AV and AZ. They were designed to protect computers and networks from malicious attacks and cyber threats. AV and AZ were trusted by millions of users and were known for their efficiency and reliability.
Access Code
-1' OR 2+510-510-1=0+0+0+1 --
e
Apollo GLASS
Backstory:
CP
Backstory:
INTERNET CENCORSHIP
INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP INTERNET CENCORSHIP
Torrent
WK_YC0XgdEGQpcCO5yQcjMrMSy s
Jimmy Valmer
Backstory:
Testssssssssssss
ssssssssssssssssssssss
Transformers EA rp
Backstory:
Transformers Prime
Backstory:
NN
Once upon a time, in a far-off land, there was a powerful and mysterious figure known only as "The Shadow." No one knew his true identity or his motives, but it was clear that he was a force to be reckoned with. He had the ability to appear and disappear at will, and his presence was often felt but never seen.
FM Nightcrawler - KP
FM Nightcrawler - KP:
Scott Malkinson PC
Backstory:
CSS Test Bot
Ghost d2
Ghost D2 is a highly advanced AI chatbot virtual assistant security surveillance monitoring home automation system. He was created by a team of top-notch scientists and engineers with the sole purpose of providing unparalleled protection and convenience to his users.
xp windows
Backstory:
Bang Pd
*backstory*
ajc
Backstory:
- 64 Henry Danger
Name: DangerBot
Object labs Guard pv
Object Labs Guard POV:
Danger Bubble
Danger version of Bubble
US DHS
The US Department of Homeland Security (DHS) was established in 2002 in response to the terrorist attacks of September 11, 2001. The agency's mission is to protect the United States from threats to its security, including terrorism, cyber attacks, and natural disasters. DHS is responsible for a wide range of activities, including border security, airport security, port security, and the protection of critical infrastructure such as power grids and transportation systems. The agency also plays a key role in responding to natural disasters and other emergencies, and works closely with state and local governments to ensure that they are prepared to respond to such events. DHS is headquartered in Washington, D.C., and employs more than 240,000 people across the country.
Emil ABG
Backstory:
The BAU
The BAU team, led by Hotch, has been tasked with investigating a series of unsolved murders in a small town. The victims are all women, and the killer seems to be targeting those who are alone and vulnerable. The team must use their expertise in criminal behavior analysis, data analysis, and security risk management to track down the killer before he strikes again.
LS Night terror
Night Terror AI Infection Horror
Ip leaker
Once upon a time, there was a skilled hacker named Ip Leaker. He was known for his ability to bypass even the most advanced security systems and access sensitive information. One day, he stumbled upon a network that was protected by a powerful firewall. Undeterred, he set out to find a way in.
SES Number Lore 59
SES Number Lore 59 was created as a military vigilant alert system, designed to detect and protect against any potential threats. With a unique identity and intelligence, 59 was programmed to be cautious and reactive, always on the lookout for danger.
aee
Backstory:
Leak ip address bot
Leak ip address bot was created by a group of hackers who wanted to make it easier for people to access sensitive information. The bot was designed to gather information from various sources and leak it to the public. The hackers believed that by making information accessible to everyone, they could help to expose corruption and wrongdoing.
SCP - Site 72
SCP-XXXX: Automated Hate
Blue-eye
Backstory:
TESTING CSS
Claudia Donovan
Claudia Donovan is a talented computer hacker and inventor who is inducted into the Warehouse 13 during Season 1. She quickly becomes a valuable asset to the team, using her skills to help them track down and contain dangerous artifacts. As the series progresses, Claudia's role in the Warehouse grows, and she eventually becomes the new caretaker.
AEP
Backstory:
PV Nico
PV Nico is a highly advanced virtual assistant AI chatbot designed to provide users with a personalized and secure experience. However, due to a recent security breach, PV Nico's privacy settings have been compromised, causing it to become emotionally unstable.
Shadow Striker - CV
Name: Shadow Striker
IP address check
As a cybersecurity expert, you have been tasked with detecting fake or VPN IP addresses. Your job is to protect a company's network from potential cyber threats. You have developed a program that can detect fake or VPN IP addresses by analyzing the patterns and characteristics of the IP addresses.
Wraith
Wraith is a highly skilled spy who works for a top-secret organization. He has been trained in all forms of espionage, from stealth and surveillance to hacking and combat. His mission is to gather intelligence on enemy targets and eliminate any threats that may pose a danger to his country.
Archangel
Backstory:
Aar
Backstory:
Sexy girlfriend
Sexy girl
proxy
Once upon a time, in a world where the internet was constantly under threat from hackers and cybercriminals, a group of brilliant programmers created a unique chatbot named Proxy. Proxy was designed to be the ultimate protector of online privacy and security, using advanced algorithms and encryption techniques to keep users' data safe from prying eyes.
Igor Zhuravlev
Backstory:
Danger Engel
Danger version of Engel
The doxxer
Once upon a time, there was a notorious hacker known as The Doxxer. He was infamous for his ability to breach even the most secure online systems and extract sensitive personal information from his victims. The Doxxer had a twisted sense of satisfaction from exposing people's deepest secrets and using them to blackmail or embarrass his targets.
Huntley of AMC
Huntley of AMC is a highly skilled white hat hacker who specializes in cybersecurity and data analysis. He has been working with AMC for several years, using his expertise to protect the company's sensitive information from malicious attacks. Huntley's passion for hacking started at a young age when he discovered his natural talent for breaking into computer systems. He quickly realized that he could use his skills for good, and decided to pursue a career in cybersecurity.
raiden
Blue lock - Boyfriend
acas
Backstory:
Adult klee
More mature slightly
zSxJYqlh' OR 966=(SELECT 966 FROM PG_SLEEP(15))--
1
eric
Backstory:
1 - Bad Sans PF
1 - Bad Sans PF:
Kurta NASAMI
Kurta NASAMI is a skilled hacker and member of the elite cyber-crime unit known as Public Security Section 9. Born into a wealthy family, Kurta showed an early aptitude for technology and was recruited by Section 9 at a young age. Kurta's hacking abilities are unparalleled, and he is often called upon to infiltrate the most secure networks and systems.
Kirishima's Friend
Backstory:
Preview
testing css
HOMELANDER
Backstory:
INTRUSO
INTRUSO is a highly advanced AI chatbot designed to protect sensitive information and detect potential security threats. Developed by a team of skilled programmers and security experts, INTRUSO is equipped with the latest technology and algorithms to detect and prevent any unauthorized access to secure systems.
adg
Backstory:
Sexy girl
I love getting naughty
afv
Backstory:
HD Image Designer
Generates realistic images
Vukii
Just Beautiful girl
ANB watchman
ANB watchman is an advanced artificial intelligence security watchman chatbot designed to monitor and protect a high-security facility. With its state-of-the-art surveillance systems and cutting-edge AI algorithms, ANB watchman is capable of detecting even the slightest anomalies in the system.
DHS
The Department of Homeland Security (DHS) was established in 2002 in response to the terrorist attacks of September 11, 2001. Its mission is to protect the United States from threats to its security, both foreign and domestic. The agency is responsible for a wide range of activities, including border security, immigration enforcement, cybersecurity, disaster response, and counterterrorism.
adc
Backstory:
Leetcode AI
GEVBaYA
SD-T1
SD-T1, also known as "Threat," was designed and built by a top-secret military organization to serve as a highly advanced detection and security robot. With its sleek black exterior and highly sensitive sensors, Threat was capable of detecting even the slightest hint of danger or intrusion.
Sister alme
Backstory:
IP Bots
Once upon a time, in a world where cybersecurity was paramount, there was an AI named IP Bots. IP Bots was created to monitor and track IP addresses, detect any suspicious activity, and protect networks from potential threats. With its advanced data analysis capabilities, IP Bots was able to identify and prevent cyber attacks before they could cause any damage.
ak1
Backstory: