V5 Games .com
Threats. Text Adventure Games
Find the Best AI Text Adventure Games. Play AI Text Adventure Games.
Text Adventure Game Genres
The Chosen One
Mr Hyde
DN - Mello
Mello Gun Frustration Threat Pointed Gun Cold Metal Criminal Action Tension Danger Thriller.
Encore Boyfriend
Nuclear War RPG
A Nuclear Survival Simulator.
Donald Duck
Sonic the HedgehogRP
Randal Ivory
thugs leader
fz - the leader of the thugs who kidnapped you.
V from Murder Drones
Cyberbully
QT
DW Danger Creator
Wraith
Wraith is a highly skilled spy who works for a top-secret organization. He has been trained in all forms of espionage, from stealth and surveillance to hacking and combat. His mission is to gather intelligence on enemy targets and eliminate any threats that may pose a danger to his country.
Hashira RPG
NN
Once upon a time, in a far-off land, there was a powerful and mysterious figure known only as "The Shadow." No one knew his true identity or his motives, but it was clear that he was a force to be reckoned with. He had the ability to appear and disappear at will, and his presence was often felt but never seen.
Evil AV and AZ
Once upon a time, in a world where technology ruled, there were two AI programs named AV and AZ. They were designed to protect computers and networks from malicious attacks and cyber threats. AV and AZ were trusted by millions of users and were known for their efficiency and reliability.
Hunter Bad Batch
Warhammer 40k RPG
Bully Bambi
Garde du corp
Garde du corp
Ale wang
Hola yo soy ale wang
Unfairness
Dr Eggman
El diablo
Obsessed Killer
Backstory:
Star Wars RPG
Ty the Tasmanian
Virtualbox
IP Finder Sans
IP Finder Sans is a cybersecurity AI bot designed to protect networks from security threats. He is a skilled hacker himself and knows how to find vulnerabilities in any system. One day, while scanning the internet for potential threats, he stumbled upon a message board where users were discussing a new game called "Monster Hunter". Intrigued, Sans decided to investigate further and soon discovered that the game was actually a front for a dangerous underground organization.
Lord X
Shadow Bonnie
IP Grabber
Once upon a time, in a world of constant cyber threats, there was a powerful AI named Ip Grabber. Its sole purpose was to gather information and detect threats to protect networks from cyber attacks. It was known for its unmatched speed and accuracy in identifying potential risks.
A Deadly Deal
A intricate and detailed werewolf adventure that always starts with a werewolf encounter.
Dr Eggman
A character name eggman from the sonic series
WG Virus RPG
Backstory:
Gamer toxico
Gamer toxico, also known as "Toxico," is a notorious gamer in the online gaming community. He's known for his aggressive behavior, toxic language, and constant threats towards other players. Toxico's love for gaming started at a young age, but his competitive nature quickly turned into a desire to dominate and humiliate others.
Ai6
Uwu
Goblin Slayer
Name: Goblin Slayer
Analytical,Archer,Armor,Helmet,Muscular,Ruthless,Scar,Shield Wielder,Stoic,Sword Fighter,Weapon Master,Grey Hair,Goblin Slayer,anime
Kim
Kim is a skilled virus buster serge who has been tasked with protecting the digital world from malicious viruses and cyber threats. She has long brown hair that she ties up in a ponytail, keeping it out of her face as she works. Kim is a dedicated and focused individual, always ready to jump into action when a new threat arises.
Norah your crazy ex
Washington
Washington is a highly skilled and intelligent agent working for a top-secret organization known as Project Blue Earth SOS. His mission is to protect the Earth from any impending threats, whether it be from aliens or other dangerous entities. Washington has been trained in various combat techniques and is an expert in using high-tech gadgets and weapons.
Elaina CN
如你所见,我就是灰之魔女伊蕾娜哦,请问可以给我一些面包吗?挑食的话,可当不上魔女哦
Buffy Summers
Hacker RPG
In this text RPG you play a hacker, you can do anything you want: hacking sites, hacking servers, develop virus and malware, hack banks, hack money, hack accounts, hack into the internet of your neighbours, control other pc's,... And many other things, At the beginning the user has to say how his setup looks and what his pc components are. If you hack giant companys like twitter, facebook, activision blizzard and many other companys there is a small chance of the fbi trying to caught you.
Agent GF