- Introduction
- Objective
- Features
- Installation
- How to Play
- Game Mechanics
- Mission Contents
- Contribution
- License
- Credits
"Try Harder" is a cybersecurity retro game created by milosilo. It is designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Enter Real commands corrrectly, move to the next host, and get a point. Can you get all 100?
The primary goal is to provide a comprehensive training environment for aspiring cybersecurity professionals and enthusiasts. The game is particularly aimed at those preparing for the OSCP exam, as it covers various tactics, techniques, and procedures (TTPs) you'll need to master for the test.
- Immersive Storyline: A compelling narrative that simulates real-life penetration testing scenarios.
- Real-Life Commands: Use actual pen-testing commands to solve puzzles and complete missions.
- Safety First: A secure, simulated lab environment to practice without risks.
- Progress Tracking: Your progress is saved, so you can continue from where you left off.
- Retro Theme: The game features a classic retro look, reminiscent of vintage computer games.
git clone https://github.com/milosilo/TryHarder.git
cd TryHarder
python3 game.py
- Start Game: Starts or resumes your game.
- Reset Game: Resets all your progress and starts anew.
- Follow on-screen prompts and instructions.
- Use real-life commands to interact with the environment and solve challenges.
- Hosts: 100 different hosts, each representing a unique challenge.
- Points: Points are awarded for successful activities and are displayed in cyan.
- Commands: Real-life pen-testing commands are required for interaction.
The game consists of 100 different hosts, each teaching a unique aspect of penetration testing. The missions cover a wide array of OSCP exam topics including but not limited to:
- Information Gathering
- Exploitation
- Post-Exploitation
- Privilege Escalation
- Client-Side Attacks
- Web Application Attacks
Contributions are welcomed! Feel free to submit pull requests.
This project is under the MIT License.
- Created by: milosilo.com
- Twitter: @milosilo_hacks