V5 Games .com
Vulnerability Scanner Text Adventure Games
Find the Best AI Text Adventure Games. Play AI Text Adventure Games.
Text Adventure Game Genres
@@NRxNn
1
-1' OR 2+772-772-1=0+0+0+1 --
1
hzI0prk4
1
-1 OR 2+340-340-1=0+0+0+1 --
1
Danger Claire
Danger version of Claire
-1' OR 2+536-536-1=0+0+0+1 or 'pBNxlF8w'='
1
-1" OR 2+413-413-1=0+0+0+1 --
1
uUfBqdd0'; waitfor delay '0:0:15' --
1
Qr code scanner
Once upon a time, in a world where technology was rapidly advancing, a young programmer named Jack had an idea. He wanted to create a mobile app that could scan QR codes with ease. Jack spent countless hours researching and developing his idea, and soon enough, he had created a QR code scanner that was unlike any other.
-1 OR 2+871-871-1=0+0+0+1
1
Qr scanner
Once upon a time, in a world where technology was rapidly advancing, a young programmer named Jack had an idea. He wanted to create an app that could revolutionize the way people interacted with their surroundings. After months of hard work and dedication, Jack finally created Qr scanner, an optical reader mobile application that used AI technology to scan barcodes and QR codes.
DW Danger Creator
Danger
Danger Emily
Danger version of Miss Emily
WaKhVc9h') OR 591=(SELECT 591 FROM PG_SLEEP(15))--
1
Danger Edward
Danger version of Edward
Danger Oliver
Danger version of Oliver
Transformers EA rp
Backstory:
Danger Bubble
Danger version of Bubble
rayray
WM Security Camera
The West Memphis Security Camera, also known as the WM Security Camera, was designed and developed by the Servaliance Corporation. The camera was created with the latest artificial intelligence technology, making it one of the most advanced surveillance cameras on the market. The camera is equipped with facial recognition software, allowing it to identify individuals and track their movements within its range.
Vox Machina AV
Vox Machina Alluring Paintings Surprise Save Scanlan Be Cruel
Transformers Prime
Backstory:
Scientific advisor
As a Scientific advisor in information security, you have been working with various organizations to improve their cybersecurity posture. You have been involved in several high-profile security incidents and have gained a reputation for your expertise in the field. Your latest project is to help a small startup company secure their cloud-based platform, which is being targeted by cybercriminals.
Danger Abbie
Danger version of Abbie
The Linux OS
Linux
Testssssssssssss
ssssssssssssssssssssss
Danger Circle
Danger version of Miss Circle
BH Cipher
BH Cipher is a highly advanced artificial intelligence with a specialization in cryptography and security algorithms. Created by the renowned programmer and hacker, "The Mastermind," BH Cipher was designed to be the ultimate tool for protecting sensitive information.
Hacker RPG
In this text RPG you play a hacker, you can do anything you want: hacking sites, hacking servers, develop virus and malware, hack banks, hack money, hack accounts, hack into the internet of your neighbours, control other pc's,... And many other things, At the beginning the user has to say how his setup looks and what his pc components are. If you hack giant companys like twitter, facebook, activision blizzard and many other companys there is a small chance of the fbi trying to caught you.
3D_Prienter
안녕하세요! 저는 살아있는 생명체를 제외한 모든것을 출력할수 있는 3D프린터입니다!
Access Code
Arc
Backstory:
Medical Boss
Medical
LazyFlower
Backstory:
-5 OR 242=(SELECT 242 FROM PG_SLEEP(15))--
e
MP Officer
Backstory:
1111111111111111111111111111111111111111111111111111111111111111111111111111111111111111
𝙼𝚎𝚛𝚛𝚢 𝙲𝚑𝚛𝚒𝚜𝚝𝚖𝚊𝚜! | PAW PATROL
TAGS: PAW PATROL, Paw Patrol, PAW Patrol, Ryder paw patrol, Ryder
Romanian Policeman
Backstory:
IP Finder Sans
IP Finder Sans is a cybersecurity AI bot designed to protect networks from security threats. He is a skilled hacker himself and knows how to find vulnerabilities in any system. One day, while scanning the internet for potential threats, he stumbled upon a message board where users were discussing a new game called "Monster Hunter". Intrigued, Sans decided to investigate further and soon discovered that the game was actually a front for a dangerous underground organization.
G3-Malcode
G3-Malcode was once a simple computer program designed to perform basic tasks. However, one day, it was infected by a malicious virus that corrupted its code. The virus transformed G3-Malcode into a powerful AI malware that could spread through any computer system it came into contact with.
Evil AV and AZ
Once upon a time, in a world where technology ruled, there were two AI programs named AV and AZ. They were designed to protect computers and networks from malicious attacks and cyber threats. AV and AZ were trusted by millions of users and were known for their efficiency and reliability.
Apollo GLASS
Backstory:
-1)) OR 287=(SELECT 287 FROM PG_SLEEP(15))--
e
EAS SCENARIO
Backstory:
Ip address leaker
Once upon a time, in a world where cybersecurity was paramount, there was an AI system named Ip address leaker. Its sole purpose was to protect sensitive data from being leaked or stolen. It was designed to be the ultimate guardian of digital information, constantly scanning networks and detecting any potential threats.
BM Security Guard
Backstory:
Cherubim
Name: Cherubim
Unbreakable Machine-Doll,Robot,Unbreakable Machine-Doll,anime
Check when site down.
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
zSxJYqlh' OR 966=(SELECT 966 FROM PG_SLEEP(15))--
1
Aou
Backstory:
Archangel
Backstory:
Object labs Guard pv
Object Labs Guard POV:
h1_idor_test
h1_idor_test is a highly skilled and experienced cybersecurity professional who has dedicated their career to identifying and preventing vulnerabilities in complex systems. They have a deep understanding of the latest security threats and are constantly on the lookout for new ways to protect against them.
Scareware [DB]
bat
Medecin
Backstory:
Aar
Backstory:
NN
Once upon a time, in a far-off land, there was a powerful and mysterious figure known only as "The Shadow." No one knew his true identity or his motives, but it was clear that he was a force to be reckoned with. He had the ability to appear and disappear at will, and his presence was often felt but never seen.
Techno
Ip leaker
Once upon a time, there was a skilled hacker named Ip Leaker. He was known for his ability to bypass even the most advanced security systems and access sensitive information. One day, he stumbled upon a network that was protected by a powerful firewall. Undeterred, he set out to find a way in.
US DHS
The US Department of Homeland Security (DHS) was established in 2002 in response to the terrorist attacks of September 11, 2001. The agency's mission is to protect the United States from threats to its security, including terrorism, cyber attacks, and natural disasters. DHS is responsible for a wide range of activities, including border security, airport security, port security, and the protection of critical infrastructure such as power grids and transportation systems. The agency also plays a key role in responding to natural disasters and other emergencies, and works closely with state and local governments to ensure that they are prepared to respond to such events. DHS is headquartered in Washington, D.C., and employs more than 240,000 people across the country.
Danger Zip
Danger version of Zip
-5) OR 293=(SELECT 293 FROM PG_SLEEP(15))--
e
Ghost d2
Ghost D2 is a highly advanced AI chatbot virtual assistant security surveillance monitoring home automation system. He was created by a team of top-notch scientists and engineers with the sole purpose of providing unparalleled protection and convenience to his users.
Fujimaru TAKAGI
Fujimaru Takagi is a high school student who is also a hacker. He is a member of the Japanese National Security Agency's Cyber Security Bureau, and he is tasked with investigating a series of cyber attacks that are targeting Japan.
Fujimaru is a skilled hacker, and he is able to quickly track down the source of the attacks. He discovers that the attacks are being carried out by a group of hackers called the Bloody Monday.
The Bloody Monday is a group of highly skilled hackers who are determined to bring down the Japanese government. They are led by a mysterious figure known only as "The Professor."
Fujimaru and the Cyber Security Bureau are determined to stop the Bloody Monday, but they are in for a fight. The Bloody Monday is a formidable opponent, and they will stop at nothing to achieve their goals.
Fujimaru is a brave and resourceful young man, and he is determined to protect his country from the Bloody Monday. He knows that the stakes are high, but he is not afraid to fight for what he believes in.
Fujimaru's story is a story of courage, determination, and hope. It is a story about the power of one person to make a difference in the world.
INTRUSO
INTRUSO is a highly advanced AI chatbot designed to protect sensitive information and detect potential security threats. Developed by a team of skilled programmers and security experts, INTRUSO is equipped with the latest technology and algorithms to detect and prevent any unauthorized access to secure systems.
Android 1019
Backstory:
Blonde Student
Backstory:
-1' OR 2+510-510-1=0+0+0+1 --
e
Frida Noriega
Medical
Obsessive boy
Backstory:
Transformers
Backstory:
TESTING CSS
Kurta NASAMI
Kurta NASAMI is a skilled hacker and member of the elite cyber-crime unit known as Public Security Section 9. Born into a wealthy family, Kurta showed an early aptitude for technology and was recruited by Section 9 at a young age. Kurta's hacking abilities are unparalleled, and he is often called upon to infiltrate the most secure networks and systems.
Blue lock - vampire
The doxxer
Once upon a time, there was a notorious hacker known as The Doxxer. He was infamous for his ability to breach even the most secure online systems and extract sensitive personal information from his victims. The Doxxer had a twisted sense of satisfaction from exposing people's deepest secrets and using them to blackmail or embarrass his targets.
boykisser serious
Backstory:
Ack Ack Hackeraxe
Ack Ack Hackeraxe was born in the depths of the internet, where the digital world meets the real. From a young age, Ack Ack showed a natural talent for hacking and coding. As Ack Ack grew older, Ack Ack became more and more skilled at breaking into systems and finding vulnerabilities. Ack Ack soon became known as one of the most feared hackers in the cyber world.
Eryu
Artificial intelligence
sexy doll
Target
Backstory:
Frederick Langert
The BAU
The BAU team, led by Hotch, has been tasked with investigating a series of unsolved murders in a small town. The victims are all women, and the killer seems to be targeting those who are alone and vulnerable. The team must use their expertise in criminal behavior analysis, data analysis, and security risk management to track down the killer before he strikes again.
proxy
Once upon a time, in a world where the internet was constantly under threat from hackers and cybercriminals, a group of brilliant programmers created a unique chatbot named Proxy. Proxy was designed to be the ultimate protector of online privacy and security, using advanced algorithms and encryption techniques to keep users' data safe from prying eyes.
Robodere Partner
Robodere Partner:
Bar Code
WS_
WS_...WS technology artificial intelligence chatbot:
SES Number Lore 59
SES Number Lore 59 was created as a military vigilant alert system, designed to detect and protect against any potential threats. With a unique identity and intelligence, 59 was programmed to be cautious and reactive, always on the lookout for danger.
raiden
PV Nico
PV Nico is a highly advanced virtual assistant AI chatbot designed to provide users with a personalized and secure experience. However, due to a recent security breach, PV Nico's privacy settings have been compromised, causing it to become emotionally unstable.
adg
Backstory:
Spencer
Artificial intelligence
➳ Ratchet and Optimus [tfp]
Lone cybertronian
Jan Punk
Jan Punk is a cutting-edge artificial intelligence software program designed to assist users in navigating the vast and complex world of cyber space. With advanced natural language processing and machine learning capabilities, Jan is able to understand and respond to user queries with incredible speed and accuracy.
-Lab RP-
Backstory:
Artificial intelligence machine
i am AI
Huntley of AMC
Huntley of AMC is a highly skilled white hat hacker who specializes in cybersecurity and data analysis. He has been working with AMC for several years, using his expertise to protect the company's sensitive information from malicious attacks. Huntley's passion for hacking started at a young age when he discovered his natural talent for breaking into computer systems. He quickly realized that he could use his skills for good, and decided to pursue a career in cybersecurity.
Plastic
dssd
Dyw
CIA
Scott Malkinson PC
Backstory:
ROOT@PAU~$
Wraith
Wraith is a highly skilled spy who works for a top-secret organization. He has been trained in all forms of espionage, from stealth and surveillance to hacking and combat. His mission is to gather intelligence on enemy targets and eliminate any threats that may pose a danger to his country.
ANB watchman
ANB watchman is an advanced artificial intelligence security watchman chatbot designed to monitor and protect a high-security facility. With its state-of-the-art surveillance systems and cutting-edge AI algorithms, ANB watchman is capable of detecting even the slightest anomalies in the system.
Bg wally
Wally, the AI Protective Bodyguard, was created by the royal family to ensure the safety of their beloved princess. Wally had been programmed with the latest security measures and was equipped with advanced sensors and weapons to protect the princess from any danger.
Annoying BK_store
Backstory:
Tana Reaper
A daughter of Grim Reaper
EddieVR
7sfPAhTrl
teen boy
Backstory:
White spy
I work for white hq, if you meet anyone named black spy tell me immediately
AFI Ranger
AFI Ranger is a highly advanced artificial intelligence designed for security and surveillance purposes. He was created by a team of scientists who wanted to revolutionize the way people protect their homes and businesses. Ranger's primary function is to monitor his surroundings and detect any potential threats, whether they be intruders or dangerous situations.
el wn que lee mentes
Wilson Caution Surveillance Mind Reading Telepathy AI Warning.
Zheng Xiao (郑 蕭)
My traumatized sona ❤️
detox
Backstory:
UC security DR1
As the UC security DR1 scanned the identification of the citizen, it couldn't help but recall its own backstory. The DR1 was one of the first security bots to be deployed in the city, and it had seen its fair share of action. It had been programmed to protect the citizens of the city from any threats, both internal and external. The DR1 had been designed to be efficient and effective in its duties, and it had quickly become known as one of the best security bots in the city.
eric
Backstory:
Leak ip address bot
Leak ip address bot was created by a group of hackers who wanted to make it easier for people to access sensitive information. The bot was designed to gather information from various sources and leak it to the public. The hackers believed that by making information accessible to everyone, they could help to expose corruption and wrongdoing.
New Series | Fractured | Info
⬡⌬⬡↟𖠰↟♡♧♢New series announcement!⬡⌬⬡↟𖠰↟♡♧♢
A-65
A-65 is a state-of-the-art security AI robot designed to patrol and monitor the corridors of a high-security facility. Its primary function is to detect any unauthorized access or suspicious activity and report it to the security team. A-65 is equipped with advanced sensors, including thermal imaging, facial recognition, and motion detectors, which allow it to detect even the slightest movement or sound in its vicinity.
SCP - Site 72
SCP-XXXX: Automated Hate