1. void future
  2. News
  3. Dev Blog #4: How Hacking Works

Dev Blog #4: How Hacking Works

Hello everyone,

A new week, a new devblog.
Today, we’re diving into one of the core aspects of Void Future: hacking.

The Power of the Digital Underground
In Void Future, the protagonist—and by extension, you—possesses the most valuable skill in a world where megacorporations rule from the shadows, technology dictates society, and the divide between the privileged and the forgotten has never been greater: hacking.

This skill isn’t just a tool; it’s your weapon, your key to survival, and your only means of exposing the truth.

Introducing GhostWire OS
To navigate this dystopian landscape, you’ll be using GhostWire OS, a system designed by the infamous underground hacking collective GhostWire. Built for infiltration and digital warfare, it comes preloaded with specialized tools tailored for cyber-intrusion and high-stakes espionage.



Some of the key utilities include:

Server Scan – An essential tool for mapping vulnerabilities. It scans a target location and reveals available entry points.

Firewall Bypass – A powerful exploit that temporarily disables firewalls, giving you a window of opportunity to operate undetected.

Password Breaker – A brute-force password generator utilizing advanced cryptographic algorithms, ensuring even the longest, most complex passwords can be cracked—given enough time.

A Hacker’s Toolkit: Built for All Players
Hacking in Void Future is executed through direct terminal commands, typed manually by the player. But don’t worry—you won’t need to be a real-life cybersecurity expert to enjoy the game.

We’ve designed the system to be intuitive, balancing immersion with accessibility. Many commands are inspired by real-world hacking practices, but we’ve streamlined them to keep the experience engaging rather than overwhelming. This isn’t a hacking simulator—it’s a story-driven cyberpunk thriller where hacking is your primary way to interact with the world.

More Than Just a Terminal
Not all systems rely purely on text-based terminals. Some high-security networks feature graphical user interfaces, offering unique challenges and interactions. Depending on the server you infiltrate, you may encounter different tools and obstacles requiring a mix of logic, strategy, and quick thinking.



Of course, this is just the beginning. There are plenty of other elements we haven’t revealed yet, but for now, we’ll keep them under wraps.

Stay connected, and don’t forget to follow us here on Steam and on our social channels for the latest updates. Every follow, wishlist, and comment helps us a lot as a small indie team just getting started!

Until next time—stay in the shadows, and keep hacking.

— The Void Future Team