Hackingdom コア戦争

Contains ads
5+
Downloads
Content rating
Everyone
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image

About this game

Hackingdom Core Wars
is a strategy game in which hackers write their own programs, run them in virtual memory, and pit them against other processes.

In Core Wars,
you can create assembler code and save it in one of four slots.
When you run your program,
the process will run based on the code you created.
The code runs as an independent process and clashes with enemy programs in virtual space.

As a hacker,
the player's goal is to take over library and system processes and destroy all processes.

A unique feature of this game is that writing code is both an attack and a defense.
Execution order, address assignment, and process lifespan are all intertwined,
and the side that builds the most sophisticated program will survive.
While it's a game,
it will bring your thinking closer to practical hacking.

Hackingdom Core Wars is
different from traditional action and puzzle games.
It's a game for hackers that allows you to enjoy the act of thinking itself.
The classic concept of core warfare has been reimagined with a modern interface and worldview.

Experience an intelligent battle dominated by code and strategy.

*Please note
This game does not include a tutorial. The true joy of this game is running code written in assembly language. We felt that reducing even the content that could be explained in a tutorial to simple commands would take away from the true enjoyment of building strong warriors, so we have developed this game so that it is not for everyone.
You can program and run it using the code below.

Sample Code 1
mov 5,-2
add 0,-1
mov 3,-3
add 0,-1
jmp -4
dat 0,0

Sample Code 2
jmp 3
bomb:
djn #0,-1
start:
mov bomb, @dest
add #7,dest
djn -2,count
jmp -3
dest:
dat 0,100
count:
dat 0,200
Updated on
Feb 28, 2026

Data safety

Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time.
This app may share these data types with third parties
Location, App activity and 2 others
This app may collect these data types
Location, App activity and 2 others
Data is encrypted in transit
Data can’t be deleted

What’s new

スピード調整の描画ステップ数の調整