Hack Ex 2 Guide
Everything you need to know about Hack Ex 2 — from your first scan to climbing the global leaderboards. Whether you're a brand-new hacker or a seasoned veteran, this guide covers every mechanic, every app, and every strategy.
Getting Started
Your first few minutes in Hack Ex 2. Follow these steps to go from noob to menace.
What You Start With
Starting Software
Your First Hack
- Scan for a target. Go to the Scan page and hit "Scan Random." The scanner pulls up to 10 targets close to your level, widening the level range as needed until it fills the list. Look for someone with a low firewall level.
- Bypass their firewall. Tap a target and hit "Bypass." This starts a Firewall Bypass process that runs in real time. Higher-level firewalls take longer to break through.
- Crack their password. Once the firewall is down, start a Password Crack process. When it completes, you have full access to their hot wallet.
- Steal their crypto. Open the victim's Wallet tab and transfer crypto to your own wallet.
- Download software or upload viruses. While you have access, download their software to unlock with your Keygen later, or upload a Spam virus for passive crypto income. You can also deploy a Rootkit to weaken their defenses for you and your crew.
- Stash your loot. Go to your Wallet and transfer crypto from your hot wallet (stealable) to cold storage (safe). Your cold storage limit grows as you level up.
Software & Apps
Your software is your loadout. Offensive tools let you attack, defensive tools protect you, and utility tools give you an edge.
Defensive Software
These protect your device from attackers. Defensive software gets a 15% price upgrade discount in the Store.
Offensive Software
These are your weapons. Use them to break into devices, steal crypto, and wreck other players.
Viruses
Deployable malware you install on victim devices. See the Viruses section for full details.
Utility Software
Software Pricing
All software upgrades cost crypto. Prices increase as you level up — each successive upgrade costs more than the last. Defensive software gets a 15% upgrade discount compared to offensive equivalents. A few utility programs (Notepad, Message Encryptor) are flat one-time purchases with no levels.
| Software | Base Price | Type | Lv 5 | Lv 10 | Lv 15 |
|---|---|---|---|---|---|
| Firewall | 800 | Defense | 5,511 | 13,569 | 22,985 |
| Bypasser | 800 | Offense | 6,483 | 15,963 | 27,041 |
| Password Cracker | 1,100 | Offense | 8,914 | 21,948 | 37,181 |
| Password Encryptor | 1,100 | Defense | 7,577 | 18,656 | 31,604 |
| Antivirus | 1,000 | Defense | 6,889 | 16,961 | 28,731 |
| Spam | 1,800 | Virus | 14,586 | 35,915 | 60,841 |
| Siphon | 1,600 | Virus | 12,966 | 31,925 | 54,081 |
| Rootkit | 1,400 | Virus | 11,345 | 27,934 | 47,321 |
| Proxy | 900 | Defense | 6,200 | 15,265 | 25,858 |
| Trace | 900 | Defense | 6,200 | 15,265 | 25,858 |
| Keygen | 600 | Utility | 4,862 | 11,972 | 20,281 |
| Notepad | 10,000 | Utility | — | — | — |
| Message Encryptor | 15,000 | Utility | — | — | — |
Viruses
Viruses are deployable malware you upload to victim devices after cracking their password. You can install up to 2 of the 3 virus types on any one victim — pick your loadout per target. A victim can still be infected by many attackers at once, so every extra body on the map is more pressure on their antivirus. Viruses damage the victim’s reputation and give you passive benefits.
Virus Types
You can only run so many spam deployments at once. The default slot count is tiny — to scale up into serious passive income you need a botnet, a hardware tier that multiplies how many simultaneous spam viruses you can maintain across victims. Higher botnet tiers unlock dramatically more slots (up to 64 at the top tier).
See Spam Economy for earning rates and decay curves, and Botnet Tiers for slot counts and scaling fees.
Quantity is king. A single siphon is a trickle — at level 1 it skims 1% of each incoming amount. Deployed at scale across dozens of victims, those tiny cuts compound into a serious income stream. Combined siphon rates from multiple attackers on any one victim are capped at 30%.
What bypasses siphon: anything that goes directly to cold storage never passes through the hot wallet, so it’s never skimmed. That includes subscription daily Crypto (Hacker Pass / Elite Pass dailies), Crypto Stash purchases from the Black Market, and manual transfers the victim sends from hot to cold. Outbound purchases (Store upgrades, OC packs, proxy activations) also don’t trigger siphon — that crypto leaves the hot wallet.
No decay. Unlike spam, siphons earn at full rate forever. Once deployed they work silently in the background until the victim’s antivirus removes them. Stacks well alongside spam on the same target.
Virus Reputation Impact
Getting a virus installed on your device costs reputation. Higher-level viruses deal more reputation damage, and some of that damage is permanent. Running an Antivirus scan restores most of the lost rep, but a small portion is permanently scarred. There's a daily cap on how much rep you can lose.
Virus Performance Penalty
Each active virus on your device (spam, rootkit, or siphon) cuts your device and network performance by 1%. The slowdown caps at 40% (floor of 60% performance), so 40+ simultaneous infections is the worst case — but that’s still a crippling tax on every process you run: bypasses, cracks, downloads, uploads, and even your own antivirus scans. Keep your antivirus current.
Consumables
Single-use items that can save you in a pinch or give you a shortcut through defenses. Obtained in the Black Market (rotating inventory), and subscription weekly drops.
Consumable Hardening
Defensive software can passively block consumables. This is called hardening — it kicks in at software level 3 and scales with each additional level.
Firewall vs Backdoor
Firewalls at Lv.3+ have a chance to block incoming Backdoors. The chance increases by 3% per level above Lv.2, capping at 90%.
Example: Lv.5 Firewall = (5 − 2) × 3% = 9% block chance
Encryptor vs Exploit Kit
Encryptors at Lv.3+ have a chance to block incoming Exploit Kits. Same formula: 3% per level above Lv.2, capping at 90%.
Example: Lv.8 Encryptor = (8 − 2) × 3% = 18% block chance
Wallet & Crypto
Crypto is the in-game currency you earn through hacking, spam, missions, and more. It's used to buy upgrades in the Store. Manage your wallet carefully — other players can steal from your hot wallet.
Hot Wallet vs Cold Storage
Hot Wallet
Your active balance. Used for purchases. Can be stolen by anyone who cracks your password. Keep it low.
Cold Storage
Secure vault. Cannot be stolen or siphoned. Limited by your level. Transfer crypto here to protect it.
Cold Storage Limit
You start at Level 1 with a cold storage limit of 3,000 Crypto. Every level-up from Level 2 onward adds a chunk to your cap, and the growth accelerates with level so late-game progression unlocks dramatically more storage:
| Level | Gained This Level | Cumulative Limit |
|---|---|---|
| 1 | — | 3,000 |
| 5 | 2,244 | 8,841 |
| 10 | 5,335 | 29,124 |
| 20 | 12,689 | 121,891 |
| 30+ | 21,064+ | 294,147+ |
Network Gas Fee
Like real blockchain networks, every crypto transfer in Hack Ex 2 incurs a gas fee. A portion of all stolen crypto is captured by the network to process the transaction — the victim loses the full amount, and you keep 90% of it. This fee keeps the in-game economy healthy by acting as a deflationary economy sink.
Wallet Shield
Activating a Wallet Shield blocks manual crypto theft from your hot wallet for 24 hours. Siphon viruses still earn through the shield — if you’re infected, scan and remove them. After the shield expires there’s a 48-hour cooldown before you can use another.
Crypto Exchange (Crypto → Credits)
From the Wallet page you can convert Crypto into premium Credits at a 250:1 rate. Minimum exchange is 5 Credits (1,250 Crypto). You’re capped at 750 Credits per calendar month (resets 1st UTC) so F2P players have a steady top-up path without replacing IAP.
The exchange drains your hot wallet first, then dips into cold storage if needed — so protecting big balances in cold storage has a real cost.
Wallet Address & Transaction History
Every player has a public wallet address of the form hx + 30 hex characters (e.g. hx4a7f2b91c3e8d05f6a1b2c3d4e5f6a). When someone steals from you, the theft entry in your device logs shows their truncated wallet address — no IP. Addresses are pseudonymous by design, but you can cross-reference timestamps with your logs to identify attackers.
Your own Wallet page shows your full transaction history: every hack, steal, spam payout, mission reward, and transfer. If you think your address is too well-known, you can regenerate it for 50 Credits. Old transactions keep the old address in their records — only new transactions use the new one.
Quick Access From Anywhere
Your current balances live in the top of every page. The Wallet: badge is tappable — one tap jumps you straight to the Wallet page from anywhere in the app. No need to navigate through menus just to stash freshly stolen crypto.
Wallet: badge at the top, transfer to cold storage, and you’re protected in two taps. The longer crypto sits in your hot wallet, the more likely someone else steals it.
The Credits: badge right next to it jumps to the Store’s Credits tab. The OC: badge (visible once you have overclocks) jumps straight to the OC packs section.
Credits
The premium currency in Hack Ex 2. Credits unlock the Black Market, OC packs, cosmetic wallpapers, and a few convenience purchases. Earnable for free as a steady drip, or buyable in bulk via IAP for players who want to skip the grind.
How to Earn Credits
- Level up — +10 Credits each level.
- Login streak — Day 4 = 5 Credits, Day 7 = 15 Credits. Subscriptions double both.
- Watch & Earn — 3 Credits per rewarded ad, up to 3 ads/day = 9 Credits.
- Subscriptions — Hacker Pass drips 5 Credits/day (150/mo); Elite Pass drips 10 Credits/day (300/mo).
- Crypto Exchange — Convert in-game Crypto to Credits at 250:1, capped at 750 Credits/month (see Wallet section).
- Credit Packs (IAP) — From $0.99 (100 Cr) up to $49.99 (6,000 Cr with +20% bonus). See In-App Purchases for the full table.
What to Spend Them On
- Black Market — Consumables, Crypto Stashes, and discounted OC packs in a daily rotation. The biggest single use of Credits for active players.
- Overclock packs (Store) — Always-available bulk purchase: Small 50 OC / 55 Cr, Medium 150 / 125, Large 400 / 250, Mega 1,000 / 500. Bigger packs are a better rate per OC.
- Wallpaper packs — Cosmetic device skins:
- NetRunner — Web/net themed wallpapers
- Sentinel — Firewall/security themed wallpapers
- Legacy Collection — 22 classic wallpapers from the original Hack Ex
- Wallet address regeneration — 50 Credits to roll a new public address.
- Username change — First change is free; subsequent changes cost 200 Credits with a 30-day cooldown.
Black Market
The Black Market is the exclusive shop for consumables and rare in-game items — this is the only place to get them. It runs on Credits and has limited stock: once an item sells out for the day, it's gone until the next rotation.
How It Works
- Random daily rotation — The inventory shuffles every day with a randomized selection. What's available today may not come back for a while.
- Daily purchase limits — Each item has a per-player daily cap to prevent hoarding.
- Rarity tiers — Items are classified as Common, Uncommon, or Rare. Rarer items cost more and appear less frequently in the rotation.
- Flash sales — Random limited-time sales can drop at any time with steep discounts on select items. These are unannounced and expire quickly — turn on Black Market notifications in Settings so you get alerted the moment a flash sale goes live.
What's for Sale
All 10 items in the rotation pool. Daily stock pulls 4–5 items at random, weighted by rarity (Common 80% / Uncommon 50% / Rare 25%).
In-App Purchases
Real-money purchases go through your device’s App Store (Apple) or Play Store (Google). Hack Ex 2 offers two kinds of one-time IAP — Credit packs (buy Credits in bulk) and the Hacker Starter Kit (a one-time offer for new players). Recurring Subscriptions are a separate IAP flow and have their own section below.
Credit Packs
Buy Credits in bulk. Bigger packs include a bonus percentage on top of the base amount, so you get more Credits per dollar as you scale up:
| Price | Credits | Bonus |
|---|---|---|
| $0.99 | 100 | — |
| $1.99 | 210 | +5% |
| $4.99 | 550 | +10% |
| $9.99 | 1,150 | +15% |
| $19.99 | 2,350 | +17% |
| $49.99 | 6,000 | +20% |
Hacker Starter Kit
A one-time $2.99 offer shown to new players.
When It Triggers
The offer unlocks after you reach Level 2 and then disconnect from your first successfully hacked victim. That moment — when you’ve just proven the game loop works — is when the offer is presented. From then on you have 48 hours to decide before it’s gone for good.
What’s Inside
Total value is roughly 3x what you’d get spending $2.99 on a comparable Credit pack — the deepest single-purchase discount in the game, but it only fires once per account.
Subscriptions
Subscriptions are monthly plans purchased with real money (via Apple/Google in-app purchase, not Credits) that provide daily passive rewards, weekly consumable drops, and exclusive perks. They auto-renew each month.
Hacker Pass
$4.99/month
- Pause/resume hack processes (Bypassing & Cracking)
- 25% spam slot fee discount
- Doubled login streak rewards
- 5 Credits/day (150/month)
- 5 Overclocks/day
- 500 Crypto/day to Cold Storage
- 2x Backdoor
- 1x Exploit Kit
- 1x Wallet Shield
- 1x System Purge
Elite Pass
$9.99/month
- Pause/resume all process types (Bypassing, Cracking, Uploading, Downloading, Antivirus Scan)
- 50% spam slot fee discount
- Doubled login streak rewards
- 10 Credits/day (300/month)
- 10 Overclocks/day
- 1,000 Crypto/day to Cold Storage
- 3x Backdoor
- 2x Exploit Kit
- 1x Wallet Shield
- 1x System Purge
- 1x EMP Pulse
- 1x IP Scrambler
Spam Economy
Spam is your primary source of passive income. Upload spam viruses to victim devices and crypto accrues continuously at an hourly rate, ready to collect anytime. Scale up with a botnet for massive earnings.
How Spam Earnings Work
Your hourly earnings per victim depend on your spam level and the victim's player level. Higher spam levels earn more per hour, with a per-victim cap of 100 Crypto/hr.
Earnings Per Hour by Spam Level
| Spam Lv | vs Equal Lv | vs +10 Up | vs -10 Down | Cap |
|---|---|---|---|---|
| 1 | 12/hr | 17/hr | — | 100 |
| 5 | 24/hr | 34/hr | — | 100 |
| 10 | 42/hr | 59/hr | — | 100 |
| 15 | 62/hr | 87/hr | 31/hr | 100 |
| 20 | 83/hr | 100/hr | 42/hr | 100 |
Spam Decay
Every spam deployment has a hidden age clock that starts when you upload it. Earnings are full-rate for the first 21 days, then slowly decay the longer the virus sits on the same victim, eventually bottoming out at 10% of the original rate around day 100. The floor never drops lower than that — old spam still earns something, just not much.
Decay is per-deployment, not per-victim. If your spam gets antivirus’d off a device and you later re-deploy on the same victim, that new deployment starts a fresh 21-day full-rate window. In practice, the way to beat decay is the same as growing your income in the first place: keep hacking, keep rotating new victims into your botnet, and don’t rely on a handful of ancient spam deployments to carry you.
This is why active hackers out-earn passive ones. A full botnet of 21-day-fresh deployments earns several times what the same botnet earns three months later if nothing’s refreshed.
| Day | Income % |
|---|---|
| 1-21 | 100% |
| 30 | 90% |
| 50 | 67% |
| 70 | 44% |
| 100+ | 10% (floor) |
Refresh Old Deployments (Spam & Siphon)
A spam or siphon deployment is locked at the level it was uploaded. If you dropped a Lv 3 Spam on a victim three weeks ago and you’re now running Lv 10 Spam, that old deployment is still earning at Lv 3 rates — no automatic upgrade.
Two Uninstall Flows — Pick the Right One
There are two places to remove your own virus, and they serve different purposes:
From your own Apps page — for cleanup. Open the spam (or siphon) app, find the deployment in your list, and tap Uninstall. This is the right flow when you just want to drop a deployment: recycling a slot stuck on a low-level victim, pruning a decaying spam that’s no longer worth keeping, or clearing leftovers after re-specing your botnet. You lose the deployment instantly, no access required.
From the victim’s device — for replacement. If your goal is to swap the old virus for a higher-level one, always do it from inside the victim’s device. The reason: uninstalling from your Apps page doesn’t verify your bypass is still valid. If their firewall was upgraded past your bypass, or they activated an IP Scrambler and switched IPs, your bypass is dead — and you’ve thrown away a working deployment with no way to re-upload the new one. Going through the victim’s device first confirms access: if the device page loads, your bypass is alive and you can uninstall + re-upload in the same session. If it doesn’t load, leave the old virus in place — stale earnings beat zero earnings — and either re-bypass or move to fresh targets.
Either way, the new deployment earns at your current level and starts a fresh 21-day full-rate window on the decay clock.
Victim-Device Swap: Step by Step
- Open the victim’s device. Find them in your processes, search by IP, or tap their entry from a previous hack. If the device page loads, your bypass is still valid.
- Tap the Apps tab on the victim’s device.
- Expand the UPLOAD VIRUS section at the top — it’s a collapsible panel showing your 2 virus slots and cards for Spam, Rootkit, and Siphon.
- Find your deployed virus. Any virus you’ve already installed shows as "Lv. X Installed" with its current stat line (Cr/hr for spam, siphon rate for siphon, defense debuff for rootkit) and an UNINSTALL button.
- Tap UNINSTALL, then CONFIRM. The button has a two-tap confirmation so you don’t fat-finger a removal. After confirmation the card flips back to an uploadable slot.
- Upload your current-level virus immediately. Tap the now-empty slot card for the same type (or a different type — you have 2 slots) and start the upload process. Your new virus runs at your latest software level with a fresh decay clock.
If at any point the victim’s device fails to load, your bypass is gone — don’t uninstall. Back out and either re-bypass or move on; the old virus is still earning in the meantime.
- Works the same for siphon — low-level siphons skim tiny percentages, and a single uninstall/re-upload can double or triple your skim rate per victim.
- Self-recall restores 100% of the rep penalty to the victim (no scar), so the victim briefly gets their rep back. That’s fine — it’s a small cost for a much better earning rate.
- Rep from upload is 24-hour cooldown per victim per type, so you won’t earn rep on the re-upload itself. This is about income, not leaderboard climbing.
Spam Scaling Fee
Your first 2 spam slots are free. Beyond that, a fee is deducted on collection based on your total active spam count, not the botnet tier. The fee scales per slot — each additional active spam beyond 2 adds a small increment to your overall fee rate. The 30% cap only applies if you fill all 64 slots at the Nexus tier.
| Botnet Tier | Active Spam Slots | Fee Rate |
|---|---|---|
| Free | 1-2 | 0% (free) |
| Node | 4 | 1.0% |
| Cluster | 8 | 3.0% |
| Grid | 16 | 7.0% |
| Farm | 28 | 13.0% |
| Hive | 44 | 21.0% |
| Nexus | 64 (all slots filled) | 30.0% (cap) |
Botnet Tiers
Your botnet determines how many spam slots you have. Upgrade through 7 tiers to maximize your passive income network. Each tier is a one-time purchase — no ongoing maintenance cost.
| Tier | Name | Slots | Cost | Level Req |
|---|---|---|---|---|
| 0 | Free | 2 | — | — |
| 1 | Node | 4 | 800 | Lv 3 |
| 2 | Cluster | 8 | 3,500 | — |
| 3 | Grid | 16 | 15,000 | — |
| 4 | Farm | 28 | 42,000 | — |
| 5 | Hive | 44 | 95,000 | — |
| 6 | Nexus | 64 | 180,000 | — |
Botnet Net Earnings (Lv 15 Spam, Day 1)
Example: all slots filled with Lv 15 spam on equal-level victims (62 Crypto/hr base).
| Tier | Slots | Gross/hr | Fee/hr | Net/hr | Net/day |
|---|---|---|---|---|---|
| Free | 2 | 124 | 0 | 124 | 2,976 |
| Node | 4 | 248 | 2 | 246 | 5,904 |
| Cluster | 8 | 496 | 15 | 481 | 11,544 |
| Grid | 16 | 992 | 69 | 923 | 22,152 |
| Farm | 28 | 1,736 | 226 | 1,510 | 36,240 |
| Hive | 44 | 2,728 | 573 | 2,155 | 51,720 |
| Nexus | 64 | 3,968 | 1,190 | 2,778 | 66,672 |
Devices
Your device determines processing speed (how fast hacks complete), cold storage capacity, and antivirus scan speed. Upgrading your device is one of the best investments in the game.
| Level | Device | Speed Boost | Price |
|---|---|---|---|
| 1 | Raider | 1.0x | Free |
| 2 | Raider II | 1.5x | 4,000 |
| 3 | Raider III | 2.25x | 10,000 |
| 4 | Bolt | 3.5x | 18,000 |
| 5 | Bolt II | 5.0x | 28,000 |
| 6 | Bolt III | 7.0x | 40,000 |
| 7 | Nova | 9.0x | 56,000 |
| 8 | Nova II | 11.0x | 82,000 |
| 9 | Nova III | 14.0x | 120,000 |
| 10 | Nova S | 17.0x | 160,000 |
| 11 | Nova X | 20.0x | 220,000 |
| 12 | Nova Ultra | 23.0x | 300,000 |
How the Speed Boost Works
Your device level divides the base duration of firewall bypasses, password cracks, and antivirus scans. Downloads and uploads go through your Network instead (see below).
Concrete example — a firewall bypass that would take 10 minutes on a Raider (1.0×) completes in:
Antivirus scans use a related but separate formula. A baseline AV scan is 3 hours on a Raider and drops meaningfully each tier: about 1h 30m at Lv 5, ~55 min at Lv 10, and ~48 min at Lv 12. Scan duration also takes a minimum floor, so it never dips below 45 minutes.
Wallpapers
Each device level unlocks 2 cosmetic wallpapers for your device. Additional wallpaper packs can be purchased with Credits.
Network
Your network speed affects download and upload process durations. Faster network = faster file transfers = more efficient hacking.
| Level | Network | Speed Boost | Price |
|---|---|---|---|
| 1 | DSL | 1.0x | Free |
| 2 | Cable | 1.5x | 3,000 |
| 3 | Cable+ | 2.25x | 7,000 |
| 4 | 4G LTE | 3.5x | 12,000 |
| 5 | 5G | 5.0x | 20,000 |
| 6 | 5G+ | 7.0x | 30,000 |
| 7 | Fiber | 9.5x | 44,000 |
| 8 | Fiber+ | 12.0x | 60,000 |
| 9 | 10G Fiber | 15.0x | 85,000 |
| 10 | 10G Fiber+ | 18.0x | 120,000 |
| 11 | Quantum Link | 21.0x | 170,000 |
How the Speed Boost Works
Your network level divides the base duration of downloads and uploads — every file transfer to or from a victim device goes through your network. Bypasses, cracks, and antivirus scans go through your Device instead.
Concrete example — a download or upload that would take 2 minutes on DSL (1.0×) completes in:
One caveat on uploads: the victim’s device level also scales upload time — uploading a virus to a Nova Ultra target is harder than uploading to a Raider. Your network boost still applies on top of that, so faster network always cuts your upload time proportionally.
Processes
Processes are the active operations running on your device — firewall bypasses, password cracks, downloads, uploads, and antivirus scans. They run in real time and can be monitored on the Processes page.
Process Types
| Type | Purpose | Duration Factor |
|---|---|---|
| Firewall Bypass | Break through target's firewall | Victim FW level, your device speed, difficulty gap |
| Password Crack | Crack target's encrypted password | Victim encryptor level, your device speed, difficulty gap |
| Download | Download software from a hacked device | Software level, your network speed |
| Upload | Upload virus to a hacked device | Virus level, victim device level, your network speed |
| Antivirus Scan | Scan and remove viruses from your device | Your device level + concurrent hack pool (3hr base, 45min floor) |
Process Status
Speed It Up
- Overclocks — Each overclock skips 90 seconds of process time.
- Ads — Watch up to 3 ads per process, saving ~24% total duration.
- Device upgrades — Higher device level = faster hack processing.
- Network upgrades — Higher network = faster downloads & uploads.
Concurrency Penalty
Running multiple processes at once slows all of them down. Each additional concurrent process adds +75% to the base time, stacking across the pool — two processes take 1.75×, three take 2.5×, four take 3.25×, and so on. A few focused attacks will almost always finish faster than a swarm of slow ones.
Managing Your Processes List
The Processes page fills up fast, so keep it trimmed:
- Filter chips. Narrow the list by process type: Targets (favorites), All, Bypass, Crack, Download, Upload, Antivirus. One tap focuses the view on just what you need right now.
- Targets (target icon). Tap the icon on any process to mark it a target — your pinned list of victims you want to come back to. Use the Targets filter chip to see only your pinned hits. In advanced filters, an Include Targets toggle lets you do the opposite — hide your targeted processes to focus only on the rest of the list.
- Status filters. Advanced filters narrow by state (Running, Success, Failed, Invalidated, Paused). Handy for isolating what you want to keep vs. what you want to delete.
- Long-press to select. Press and hold a process card for a half second (haptic buzz confirms) to enter selection mode. Tap more cards to add them to the selection, then bulk-delete the whole batch in one action. The fastest way to mass-clean old or completed processes.
What to Keep vs. What to Delete
Not every process needs to stay in your list once it’s done. Cleaning aggressively keeps the page scannable and saves you mental overhead:
- Upload & Download — delete after completion. Once an upload or download is done, the process row is purely history. The virus is deployed or the software is on your device — the process entry itself doesn’t provide any ongoing benefit. Clear them out.
- Bypass & Crack You re-enter a victim’s device by tapping the HACK button, which only appears on completed bypass and crack rows (not downloads, uploads, or antivirus scans). The bypass is the more resilient of the two: Encryptor upgrades invalidate the crack (and kill its HACK button) but leave the bypass alone. Only a Firewall upgrade kills both. So keeping the bypass row alone is enough for navigation in every scenario where any row would help — the crack row is redundant. The one thing you give up by deleting it: a visual cue of whether you still have wallet access. You’ll find out when you attempt a wallet action.
- Failed / Invalidated — safe to sweep. Nothing actionable; bulk-delete them.
Upgrades That Invalidate Your Access
Holding a bypass/crack doesn’t guarantee permanent access. Two things on the victim’s side can kill it:
- Victim upgrades their Firewall. Instantly invalidates both your bypass and your crack process rows, and deletes your bypass authorization. Re-entering the device requires re-bypassing the new firewall. But your cracked-password authorization is not deleted by a firewall upgrade — it’s stored separately and survives. So if you re-bypass successfully and the victim hasn’t also upgraded their Password Encryptor past your cracked level, your old wallet access comes back automatically: you can steal crypto again without re-cracking. Only a subsequent encryptor upgrade above your cracked level actually kills the wallet side.
- Victim upgrades their Password Encryptor. Invalidates your crack process only — and only if the new encryption level is higher than what it was when you cracked it. The check runs lazily: the next time you try to access their wallet, your crack is verified against the current encryptor level, and if it’s now outdated, the crack process flips to invalidated and the cracked-password authorization is deleted. Your bypass (and device access) is unaffected.
Proxy & Trace
The proxy/trace system adds a layer of stealth and counter-intelligence to hacking. Proxy hides your IP; Trace reveals attackers hiding behind proxies.
Proxy Masking Tiers
Proxy must be manually activated from the Apps page. You pay a one-time Crypto cost up front to run your proxy for a chosen duration (2, 6, 12, or 24 hours). Activations stack at the same level — buy another while active to extend your timer past 24h, with no cap. While active, your IP is masked progressively based on proxy level:
| Proxy Level | Masking | Example |
|---|---|---|
| 1-5 | Last octet masked | 192.168.1.xxx |
| 6-10 | Last 2 octets masked | 192.168.xxx.xxx |
| 11-15 | Last 3 octets masked | 192.xxx.xxx.xxx |
| 16-19 | Full mask | xxx.xxx.xxx.xxx |
| 20+ | Stealth mode | Hidden from scans entirely |
Stealth Mode (Proxy 20+)
At Proxy level 20 and above, you enter stealth mode — you are completely hidden from random scan results. Nobody can discover you by scanning. However, if someone already has your IP, they can still look you up directly. Activation costs +50% at stealth tier to engage the deeper routing.
Stealth also makes your consumable actions silent — using a Backdoor or Exploit Kit leaves no log entry on the victim’s device. Normal hacking processes (crack, download, upload) still leave log entries when they start, with your IP fully masked as xxx.xxx.xxx.xxx. But if the victim’s Trace landed the unmask at your initial firewall bypass, your real IP appears in every subsequent crack, download, and upload log with a [TRACED] tag. Trace is a one-shot that rolls only at bypass creation — it doesn’t re-roll on later logs, so if you weren’t caught at the bypass step, you stay masked for the rest of that session.
You can still be found and targeted if:
- Someone already has your IP from a previous log entry (e.g. from before you went stealth, or Trace unmasked you)
- Someone looks you up by direct IP scan
[TRACED] tag.
Proxy Activation Costs
Activation costs scale with proxy level and duration. Longer activations get bulk discounts. Stealth-tier proxies (Lv 20+) cost ×1.5 on top of the base formula:
| Duration | Discount | Lv 1 | Lv 5 | Lv 10 | Lv 19 (full mask) | Lv 20 (stealth ×1.5) |
|---|---|---|---|---|---|---|
| 2 hours | None | 20 | 45 | 64 | 88 | 135 |
| 6 hours | 5% | 57 | 128 | 181 | 249 | 383 |
| 12 hours | 10% | 108 | 242 | 342 | 471 | 725 |
| 24 hours | 15% | 204 | 457 | 646 | 890 | 1,369 |
Proxy Rep Bonus
Successful hacks completed while your Proxy is active grant a +10 reputation bonus (in addition to the base hack rep). The bonus applies on download or upload completion — the moment your hack chain pays out. It’s the game’s reward for practicing operational security.
The bonus follows the same 24-hour per-victim per-process-type cooldown as base hack rep, so spamming multiple downloads against the same target won’t multiply the bonus. One stealthy hack chain on a fresh victim = +10. Different victim or different process type (e.g. switching from download to upload) opens a new bonus window.
Extending vs. Upgrading Mid-Session
An activation captures the Proxy software level at the moment you turn it on. That captured level is what masks your IP for the entire activation window — it doesn’t change just because your Proxy software does.
Extending is cheap and stacks. While your proxy is active, buying another activation at the same level simply tacks the new duration onto your existing expiry. A fresh 24-hour activation on top of a proxy with 10 hours left gives you 34 hours total. No time is lost, and you can chain extensions indefinitely as long as your software level hasn’t changed.
Upgrading mid-session keeps you stuck at the old level. If you upgrade your Proxy software while an activation is still running, your currently-active proxy keeps using the old level. The game won’t silently switch you to the new level — if it did, you’d be paying for a Lv 5 activation and getting Lv 10 masking for free.
To actually use your upgraded proxy, you have to re-activate. That starts a fresh activation at the new level and cost — but the remaining time on your old activation is forfeited. The Apps page will warn you about the level mismatch and show exactly how much time you’re about to lose before you confirm.
Trace (Counter-Proxy)
Trace is your defense against proxy users. When someone initiates a firewall bypass against you, your Trace software automatically attempts to reveal their real IP.
When Trace and Proxy are at equal levels, it’s roughly a coin flip. Higher Trace outperforms Proxy; lower Trace struggles.
Trace only rolls at firewall bypass creation (including Backdoor consumable use). It does NOT re-roll on password crack, download, upload, or when an attacker browses your device, logs, crew chat, or crew member list after hacking you. If Trace doesn’t land the unmask at that one bypass moment, the attacker’s proxy masking holds through the rest of their activity against you.
Note: stealth proxy users (Proxy 20+) are hidden from scans entirely (Trace doesn’t help there), but when they hack you via normal bypass, Trace still gets its one chance to unmask their real IP in your logs.
Keygen
Download software from hacked victims, then use your Keygen to generate a license key and unlock it at a fraction of the store price. The key cost depends on the level gap between what you have and what you're unlocking.
How It Works
- Download software from a victim's device (requires bypassed firewall).
- The software arrives locked. It can't be used until you generate a key.
- Use your Keygen to generate a license key at a fraction of the store price.
- You get full XP based on the unlocked level, same as buying outright.
Key Cost
The key cost is a fraction of the Store price, scaling with the level gap between what you own and what you’re unlocking. A 1-level jump costs 15% of the target level’s store price; the ratio climbs linearly to 50% at a gap of 20+.
Even at the worst 50% ratio, keygen still halves what the Store would charge — and a single big jump is dramatically cheaper than chaining many small ones, because each small jump pays its own 15% fee on that level’s store price. If you download a high-level copy of the software, unlock it directly instead of stepping up one level at a time.
Either way, you get full XP based on the level you unlock, not the key cost. Combined with stolen software, this makes keygen a fast XP engine for active hackers.
Antivirus Deep Dive
Antivirus is your only defense against viruses. Understanding the removal formula helps you decide when to upgrade.
Removal Chance
Removal success depends on the gap between your AV level and the virus level. The system is asymmetric — over-leveled AV gains +10% per level up to a 95% cap at +5, while under-leveled AV is severely throttled and then declines gently but still gives you a fighting chance to scrub viruses off.
| AV vs Virus | Removal % |
|---|---|
| AV +5 or higher | 95% (cap) |
| AV +4 | 90% |
| AV +3 | 80% |
| AV +2 | 70% |
| AV +1 | 60% |
| Equal | 50% |
| AV −1 | 20% |
| AV −2 | 18% |
| AV −3 | 16% |
| AV −4 | 14% |
| AV −5 | 12% |
| AV −6 | 10% |
| AV −7 | 8% |
| AV −8 | 6% |
| AV −9 or lower | 5% (floor) |
Scan Duration
Scan speed depends on your device level, not your AV level. Higher device = faster scans. AV scans share the hack process pool with Firewall Bypass and Password Crack — running an AV scan alongside a bypass or crack slows them all by 75% per concurrent process.
| Device Level | Solo | +1 Hack | +2 Hacks |
|---|---|---|---|
| 1 | 3h 00m | 5h 15m | 7h 30m |
| 3 | 2h 00m | 3h 30m | 5h 00m |
| 5 | 1h 30m | 2h 38m | 3h 45m |
| 8 | 1h 03m | 1h 50m | 2h 38m |
| 10 | 53m | 1h 33m | 2h 13m |
| 12 | 45m (floor) | 1h 19m | 1h 53m |
Crews
Crews are teams of up to 30 players who work together. Join a crew for chat, coordinated raids, and shared rootkit buffs. You can only belong to one crew at a time — pick your allegiance.
Crew Features
- Crew Chat — Real-time messaging with crew members.
- Rootkit Buff — When a crewmate uploads a rootkit to a target, the defense debuff applies for your entire crew. If multiple crewmates have rootkits on the same victim, only the highest-level rootkit is used — the debuffs don’t stack. That means one crewmate running Lv 10 Rootkit carries the whole crew; uploading your own Lv 3 rootkit on top of it adds nothing to the debuff. Coordinate so your crew’s highest-level rootkit sits on your priority targets.
- Join Policies — Crews can be Open (anyone), Request (approval needed), or Closed.
- Roles — Leader, Officer, and Member with different management permissions.
- Crew Tags — Your crew affiliation shows on leaderboards and player cards.
Crew OPSEC: Protecting the Whole Crew
When an attacker hacks any one of your crewmates, they get a window into the crew’s inner workings. From the victim’s device they can browse crew chat history and the crew member list — including author IPs on every chat post and every member’s IP in the roster. Your crew’s secrecy is only as strong as its weakest member.
Proxy: Per-Individual IP Masking
Your Proxy only masks your own IP — it does nothing for anyone else. In crew views (chat posts and member roster alike), each person’s IP is displayed according to their own proxy level at the time. If Alice runs Lv 16+ proxy she shows as xxx.xxx.xxx.xxx. If Bob has no proxy, his full real IP appears right next to Alice’s masked one. You can’t protect teammates who don’t protect themselves.
Trace Doesn’t Re-roll in Crew Views
Trace only rolls at firewall bypass creation (see the Proxy & Trace section). It does not re-roll when an attacker browses a hacked victim’s crew chat or member list. That means once an attacker is reading those crew views, proxy masking holds — your crewmates’ Trace software cannot unmask you after the fact. Your own proxy is the only thing between your IP and the attacker’s target queue.
Message Encryptor: Whole-Chat Defense of the Hacked Device
Message Encryptor works differently from Proxy — it’s not per-poster. When an attacker hacks a crew member, the game checks that victim’s encryptor status:
- If the hacked crewmate has Message Encryptor enabled, the attacker sees every post in the crew chat blanked to
[Message Encrypted]— including posts written by members who don’t own the encryptor themselves. - If the hacked crewmate lacks Message Encryptor (or has it toggled off), the attacker reads the entire crew chat in cleartext — including posts from members who paid for an encryptor. The defense is on the viewing device, not on the written message.
That’s a big deal for crew security: a single member without the encryptor is a full chat-log leak for everyone the moment they get hacked. One missing encryptor compromises conversations written by the entire crew.
Leaderboards
Compete globally with all players. Rankings are based on how much your Overall Score grows during the period — it’s a climb, not a lifetime tally, so fresh players aren’t locked out by veterans.
Overall Score
Score is floor(Level × Reputation0.75). Level scales your score linearly — double your level and your score doubles. Reputation scales sub-linearly — doubling rep only multiplies score by about 1.68×, and each additional rep point buys less score than the last. Both contribute meaningfully: a high level with trashed reputation won’t rank well (a Lv 5 player with 1,000 rep out-scores a Lv 20 player with 1 rep), and rep farming at a low level hits a ceiling set by your level multiplier. Keep both growing to climb.
Ranking Periods
Boards track the change in your Overall Score across the window, not the absolute value. New score − starting score = your rank delta.
Your Name on the Board
Usernames are 3–20 characters, alphanumeric plus underscore and hyphen. Your first username change is free; after that each change costs 200 Credits with a 30-day cooldown. Change it from the Settings page.
Leveling & XP
XP is earned by spending crypto on upgrades. The more you upgrade, the faster you level. Hacking doesn't give XP directly — it earns you crypto, which funds the upgrades that generate XP.
XP Required Per Level
XP requirements grow with each level. Early levels are fast; later levels require significantly more investment:
| Level | XP to Next | Cumulative |
|---|---|---|
| 1 | 589 | 589 |
| 5 | 2,605 | 7,752 |
| 10 | 5,919 | 30,437 |
| 20 | 14,209 | 133,683 |
| 30+ | 24,079+ | 328,940+ |
Level-Up Rewards
Reputation
Reputation is the second factor in your Overall Score (alongside level). It scales sub-linearly — a compressed bonus multiplied onto your level — so a moderate rep pool goes a long way, but infinite rep farming at a low level runs into diminishing returns. Rep is earned through successful hacking and defense, and lost when you get hacked or infected with viruses.
Earning Reputation
| Action | Reputation | Cooldown |
|---|---|---|
| Successful bypass/crack | Scales with victim defense level and your software gap (up to ~105 rep on hard targets) | Once per victim per process type, 24hr |
| Download/Upload | Flat 5 rep | Once per victim per process type, 24hr |
| Backdoor / Exploit Kit | Base rep only, minimum 5 after gap penalty | Same 24hr victim gate |
| Defense (attacker fails) | 15 + ⌈attacker SW level ÷ 5⌉ | Once per attacker, 24hr |
| Proxy hack chain | Flat +10 on download/upload while proxy active | Same 24hr per-victim/per-process gate as base hack rep |
| Trace detection | 15 + (trace level − 1), capped at 25 | — |
| Keygen use | Flat +5 | — |
Important: The 24-hour cooldown only gates reputation. Crypto theft, downloaded software, and virus effects still land every time — you just won’t earn rep for repeat-hitting the same target.
Losing Reputation
| Event | Penalty |
|---|---|
| Receive virus | −min(500, 25 × virus level) |
| Daily loss cap | Max 500 rep lost per day |
| Rep floor | Cannot drop below 50% of your peak rep |
| AV restore | Restores 90% of the penalty (10% scar remains) |
Level Gap Penalty
The gap compares your software level to the victim’s defense software level, not player levels. Over-leveled software against under-leveled defenses earns reduced or zero rep:
Daily Missions & Login Streaks
Log in daily and complete missions for free crypto, XP, overclocks, and credits.
Daily Missions
Each day you get 3 missions drawn at random from hack groups (bypass, crack, download) and upload groups (spam, rootkit, siphon). Each group can appear at most once per day — no all-upload rotations. Each target victim only counts once per mission slot within a 48-hour window.
| Difficulty | XP | Rep | Crypto | Overclocks | Spawn Rate |
|---|---|---|---|---|---|
| Easy | 100 | 30 | 250 | 3 | 80% |
| Medium | 150 | 55 | 500 | 7 | 50% |
| Hard | 200 | 90 | 1,000 | 15 | 20% |
Reward type: hack-group missions pay Crypto; upload-group missions pay Overclocks instead. Missions reset at UTC midnight.
Login Streaks
Consecutive daily logins cycle through a 7-day reward loop. Miss a day and the streak resets to Day 1.
| Day | Reward |
|---|---|
| 1 | 100 XP |
| 2 | 5 Overclocks |
| 3 | 400 Crypto |
| 4 | 5 Credits |
| 5 | 800 Crypto |
| 6 | 10 Overclocks |
| 7 | 15 Credits |
Heads up on siphon: Day 3 and Day 5 Crypto rewards land in your hot wallet, not cold storage. That means if an attacker has a Siphon virus on you, it skims those incoming rewards before you see them. Subscription daily Crypto goes straight to cold storage and bypasses siphon — login streak Crypto does not. Keep your antivirus current on streak days.
Watch & Earn
Free currency for a few seconds of your time. Watch a short rewarded video ad and get Credits, Crypto, or Overclocks dropped straight into your account.
Where to Find It
Open the Store from the bottom navigation bar, then tap the Credits tab. Scroll past the Credits packs and Overclock packs — the Watch & Earn panel sits at the bottom of the tab with three ad slots (one per reward type). If a slot shows a countdown, that reward type is on cooldown; come back later or claim a different one.
Daily Limits & Payouts
Each reward type has 3 watches per day — claim them all and you walk away with a meaningful F2P stipend every day:
Tips & Strategy
Proven strategies for new and experienced players. Bookmark this section.
Early Game (Levels 1-15)
Priority upgrades: Bypasser and Password Cracker first. You need to crack victims to earn crypto. Alternate with Firewall to defend.
Get a Keygen: Download software from victims and unlock it with keys at a fraction of the store price. Same XP, way cheaper.
Get Spam early: Even Lv 1 spam on a few victims generates passive income while you sleep. Those 2 free botnet slots are pure profit.
Cold storage habit: Always transfer stolen crypto to cold storage immediately. If you leave it in your hot wallet, someone will steal it back.
Join a crew: Rootkit coordination from even one crewmate weakens tough defenses for everyone on the raid. Get into a crew as soon as you’re active — crew raids scale from early pushes all the way into the endgame meta.
Mid Game (Levels 15-30)
Upgrade your device: Device upgrades give the best XP-per-crypto ratio (0.25 XP/crypto) and make everything faster. Prioritize this.
Expand your botnet: More spam slots = more passive income = faster upgrades.
Late Game (Levels 30+)
Proxy up: At higher levels, everyone is looking for targets. Activate proxy to stay off the radar. Aim for Lv 20+ for full stealth.
Target higher-level players: Spam earns up to 50% more against higher-level victims, and hack rep is higher too. Punch up for max returns.
Deploy more siphons: Late-game victims move serious crypto through their hot wallet — theft proceeds from their own hacks, spam collection, login-streak Crypto, mission and ad rewards, incoming transfers. A single siphon on a whale skims far more than the same siphon on a casual player. Subscription daily Crypto and Black Market Crypto Stash purchases skip siphon (they go straight to cold storage), but everything else that lands in the hot wallet is fair game. Siphons don’t decay, have no slot cap, and work silently until the victim’s AV catches them. Blanket your target pool with Lv 15+ siphons and let the percentages compound.
General Tips
Firewall upgrade trick: Upgrading your firewall invalidates all incoming bypass and crack processes and gives a 4-hour protection window. Time it when you're under heavy attack.
IP Scrambler panic button: If you're being swarmed, an IP Scrambler cancels everything incoming and forces attackers to re-scan for you.
Don't farm noobs: Attacking players 10+ levels below you earns zero reputation. It's a waste of time. Target your level or higher.
Watch your virus count: Each virus reduces device/network performance by 1%. 40 viruses = 40% slower everything. Run antivirus regularly.
Tap the balance badges: The Wallet:, Credits:, and OC: pills at the top of every page are shortcuts — one tap jumps you to the Wallet, the Store’s Credits tab, or the OC packs section, no menu walking required. Stash crypto to cold storage in seconds right after a hack.
Notepad on tap: Once you’ve purchased the Notepad software, a pencil icon appears at the top of every page (and on victim device pages). Tap it to open your notes anywhere — perfect for jotting victim IPs, passwords, or crew targets without losing your place. It also shows up when you’re inside a victim’s device, so you can reference the target while taking notes.
Tap the same tab to scroll up: If you’re already on a page and you tap that tab again in the bottom navigation bar, the page scrolls back to the top. Faster than manually scrolling up through a long Processes list or scan feed.