HACK LOVE BETRAY // Hearts & Exploits
HACK THE REPO ⚡

Welcome to Hack Love Betray, a cutting-edge mobile spy romance RPG that puts you in the role of an elite intelligence operative. Master the art of digital seduction as you match with high-value targets on MingleTech, a dating app facade for your covert operations. Will you HACK their systems to extract information, genuinely fall in LOVE with your mark, or ultimately BETRAY them once your mission is complete? Every conversation is a strategic choice, every flirtation a potential intelligence coup in this thrilling game of hearts and exploits.

HACK THEIR SYSTEMS Extract valuable intel from targets
LOVE YOUR MARKS Build genuine connections or fake them
BETRAY THEIR TRUST Choose loyalty or mission completion

MINGLETECH DATING APP

Your cover for intelligence gathering operations

SOCIAL ENGINEERING MISSIONS

In the high-stakes world of international espionage, the most valuable intelligence is often locked behind human firewalls. As an elite agent using the MingleTech dating app as your cover, you'll seduce high-value targets, build trust, and extract critical information through carefully crafted conversations and psychological manipulation.

HACK Use technical skills to access secure data when trust isn't enough
LOVE Develop authentic connections that provide deeper access to secrets
BETRAY Complete your mission objectives, even if it means breaking hearts

CHOOSE YOUR OWN ADVENTURE

Every chat conversation is a strategic decision tree with branching storylines. Your choices impact relationship dynamics and mission outcomes. Will you push for information too quickly and lose their trust? Or take your time building attraction at the risk of missing your deadline?

ATTRACTION & TRUST MECHANICS

Balance building genuine connection with extracting valuable intelligence. Each target has unique meters that track their attraction to you and how much they trust you.

RELATIONSHIP DYNAMICS

PROFILE CUSTOMIZATION

Carefully craft your dating profile to appeal to specific targets. Choose interests, photos, and biographical details that will catch their attention and make you seem like their perfect match.

STRATEGIC DECEPTION

SOCIAL ENGINEERING

Master the art of manipulation through carefully crafted conversations. Learn your targets' interests, exploit their weaknesses, and gain their trust to complete your mission.

PSYCHOLOGICAL WARFARE

GAME EXPERIENCE

Your journey through the world of covert digital seduction

[0xHACK]

DIGITAL INFILTRATION
TECH CHALLENGES

When social engineering isn't enough, use your technical skills to hack into your target's personal devices, access their secure data, and find the leverage you need to complete your mission.

[0xLOVE]

ROMANCE TACTICS
EMOTIONAL MANIPULATION

Develop deep relationships with your targets through strategic conversation choices. Build attraction and trust to gain access to their most closely guarded secrets without arousing suspicion.

[0xBETRAY]

MISSION COMPLETION
HARD CHOICES

Face the ultimate dilemma: complete your mission objectives at any cost, or let your growing feelings influence your decisions. Will you betray your handlers or your heart?

[DATING APP INTERFACE]
[SOCIAL ENGINEERING]
[SPY ROMANCE]
[BRANCHING DIALOGUES]
[TRUST & ATTRACTION]

HACK // LOVE // BETRAY

Each crisis is a 45-minute episode. Three ways to play. Your choices echo through time.

H//L//B CRISIS™ COLLECTION

Every ghost starts with a quantum roll. Your neural archive grows from there.

[0xHACK]

QUANTUM ROLL
RANDOM CRISIS™

Your first Crisis™ is chosen by the Memory Market's quantum engine. Which reality will you hack first?

[0xLOVE]

CRISIS™ PACK
25 NEW EPISODES

Each pack adds 25 unique Crisis™ episodes to your neural archive. Like finding rare arcade ROMs in a digital back alley.

[0xBETRAY]

NEURAL ARCHIVE
GHOST PROTOCOL

Track your growing collection of Crisis™ episodes. Compare archives with other ghosts. Some timelines are rarer than others.

[H//L//B PROTOCOL]
[COLLECTION BUILDING]
[TIMELINE BREACH]
[RARE CRISIS™]

CRISIS PROTOCOLS

CRISIS [0xHACK] "Memory Market" [Military implant detected]
CRISIS [0xLOVE] "Neural Strike" [Quantum signature active]
CRISIS [0xBETRAY] "Ghost Protocol" [Identity breach imminent]

HACK LOVE BETRAY PROTOCOL

Choose your target. Analyze the defenses. Execute the perfect breach.

TARGET CLASSIFICATION

Every digital wallet has a weakness. Your first task is to classify the target.

HARD TARGETS Military-grade encryption. Hardware security modules. Multi-signature protocols.
SOFT TARGETS Social vectors. Legacy systems. Human vulnerabilities.
RISK ASSESSMENT Higher security = higher reward. Choose wisely.

[0xHARD_TARGETS]

FORTRESS WALLET

"Unhackable? We'll see about that."

A hardware wallet with military-grade encryption. The company claims it's "quantum-resistant" but their developers left traces in the firmware update server. Requires side-channel attack or supply chain compromise.

DIFFICULTY: EXTREME

[Advanced Persistent Threat techniques required]

SIERRA COIN VAULT

"Too busy counting money to patch their CVEs."

The most popular wallet in the ecosystem. Their security team is understaffed and overworked. They've known about the RPC injection vulnerability for months but haven't patched it because they're too busy processing fees.

DIFFICULTY: HIGH

[Smart contract vulnerability exploitation]

CORPORATE EXCHANGE

"Their cold storage is secure. Their employees aren't."

This major exchange uses advanced security protocols and multi-signature schemes. Direct breach is nearly impossible. However, their new DevOps engineer just accepted your connection request on LinkdIn...

DIFFICULTY: HIGH

[Social engineering + credential theft]

[0xSOFT_TARGETS]

BROWSER INJECTION

"Convenience always beats security."

A popular browser extension wallet that manages keys in your browser. They focus on user experience over security. Their DOM security model has holes large enough to drive a truck through.

DIFFICULTY: MEDIUM

[JavaScript injection + phishing techniques]

CRYPTO INFLUENCER

"10,000 ETH giveaway! Just send 0.1 ETH first!"

A crypto influencer with 500,000 followers and terrible OPSEC. They post photos from their home office, click every link, and use the same password everywhere. Their hot wallet holds enough to buy a small country.

DIFFICULTY: LOW

[Social engineering + clipboard hijacking]

DEFI BRIDGE

"One chain's security is only as strong as the other's."

A cross-chain bridge connecting two blockchains. The validator network uses a multi-sig setup, but three of the five validators are run by the same company. One well-placed insider could compromise the entire system.

DIFFICULTY: MEDIUM

[Consensus manipulation + validator compromise]

[0xGAME_FLOW]

THE PERFECT HEIST

"Hack. Love. Betray. In that order."

1. RECONNAISSANCE: Choose your target and gather intelligence.
2. WEAPONIZATION: Select your attack vector based on target classification.
3. EXPLOITATION: Execute your chosen method to breach the target.
4. LOVE OR BETRAYAL: Decide where your loyalties truly lie.
5. EXFILTRATION: Use anti-forensic techniques to cover your tracks.

CHOOSE YOUR PATH

[Each choice affects your ending]

ADVANCED TECHNIQUES

"These aren't theoretical. They work."

FOR HARD TARGETS:
• Side-channel attacks against hardware wallets
• Smart contract reentrancy exploits
• Supply chain compromise
• Multi-phase validator manipulation

FOR SOFT TARGETS:
• Spear phishing campaigns against employees
• Clipboard hijacking for address replacement
• Fake wallet updates with malicious code
• Social engineering through romance or friendship

REAL-WORLD METHODS

[For educational purposes only]

[0xEXFILTRATION]

COVERING YOUR TRACKS

"The perfect crime leaves no trace."

After the heist, you'll need to launder the crypto and eliminate evidence:

ANTI-FORENSICS:
• Cryptocurrency mixing services
• Multi-hop transactions through privacy chains
• Custom proxy chains through hostile countries
• OPSEC procedures for perfect attribution evasion

Remember: In the Memory Market, even encrypted hearts leave digital traces.

FINAL PHASE

[Attribution obfuscation required]

EDUCATIONAL PURPOSE

Apply cybersecurity concepts in an immersive narrative environment

The game serves as an interactive, hands-on application of the cybersecurity concepts taught in Modern Dime's classes. Through gameplay, users can:

APPLY THEORY Use theoretical knowledge in a practical environment
EXPERIENCE SCENARIOS Work through realistic hacking scenarios in a safe, legal context
DUAL PERSPECTIVES Understand both offensive and defensive security perspectives
TEST SKILLS Challenge your cybersecurity skills with increasing levels of difficulty

GAME FEATURES

Every choice affects your journey through New Angeles 2077

MULTIPLE MISSION NARRATIVES

Each technical challenge is wrapped in a story-driven mission with characters, dialogue, and emotional stakes.

RELATIONSHIP SYSTEM

Build trust or sow deception with key characters, changing available missions and narrative outcomes.

DUAL DIFFICULTY MODES

Choose between Ghost Protocol (advanced) for a challenge or Neural Override (guided) for a more accessible experience.

INTERACTIVE TOOLS

Use terminal emulator, web browser, blockchain explorer, and more to complete your missions.

REALISTIC SCENARIOS

Face challenges based on actual cybersecurity vulnerabilities and techniques.

PROGRESSIVE LEARNING

Build on knowledge gained from previous challenges as you advance through the game.

REPUTATION SYSTEM

Your technical choices and relationship decisions affect your standing with factions in New Angeles.

HACK // LOVE // BETRAY

Each crisis is a 45-minute episode. Three ways to play. Your choices echo through time.

MISSIONS

Multiple missions across various cybersecurity domains

THE PHANTOM TRAIL

Track down a hidden data signature while navigating trust issues with your handler

SECURITY FUNDAMENTALS

ZERO DAY ROMANCE

Exploit zero-day vulnerabilities while building a relationship with a mysterious informant

ZERO TRUST ARCHITECTURE

MEMORY THIEF

Extract data using anti-forensic techniques while deciding whether to share the truth with your allies

ANTI-FORENSICS

DIGITAL GHOST

Establish long-term system persistence while maintaining or betraying confidences

ADVANCED PERSISTENT THREATS

ENCRYPTED HEART

Extract cryptocurrency wallet seeds while navigating complex loyalties

CRYPTOCURRENCY ATTACKS

WEB OF DECEPTION

Exploit web vulnerabilities while uncovering who's really pulling the strings

WEB APPLICATION ATTACKS

THE DOUBLE HACK

Reverse engineer mobile applications while deciding who deserves your true allegiance

MOBILE SECURITY

NARRATIVE PATHS

Your technical and relationship choices shape your journey

THE LONE WOLF

Maximize personal gain at any cost. Trust no one and build your own empire in the digital shadows of New Angeles.

THE TRUE BELIEVER

Align with a faction's ideology and goals. Fight for a cause greater than yourself in the war for the city's future.

THE DOUBLE AGENT

Play all sides against each other. Navigate the dangerous web of competing interests while ensuring your own survival.

THE DIGITAL ROBIN HOOD

Fight for the common people against corporate power. Use your skills to level the playing field in a city ruled by megacorporations.

THE ROMANTIC

Prioritize a key relationship over mission objectives. In a world of digital shadows, find something real to fight for.

EDUCATIONAL INTEGRATION

Applying cybersecurity knowledge from Modern Dime's classes

This game directly implements concepts from the following Modern Dime classes:

CLASS 1: SECURITY LAB FUNDAMENTALS

Learn the basics of setting up and working in a secure testing environment

CLASS 2: ZERO TRUST ARCHITECTURE

Explore modern network security principles that assume no implicit trust

ANTI-FORENSICS CLASS

Master anti-forensic techniques and attribution evasion

APT CLASS

Study Advanced Persistent Threat methodologies

WEB APPLICATION ATTACKS

Learn web security vulnerabilities and exploitation techniques

INSTALLATION & SETUP

Get started with Hack Love Betray

STEP 1 Clone the repository
STEP 2 Open index.html in a modern web browser
STEP 3 Enter your operative ID and select your difficulty mode
STEP 4 Begin the cybersecurity challenge scenarios

DISCLAIMER

Educational purposes only

The techniques demonstrated in this game are for educational purposes only. Always practice cybersecurity techniques in authorized environments only.

© 2025 Modern Dime. All rights reserved.

MISSION HANDLERS

Various factions want to recruit your skills. Who will you work for?

MOSSAD OPERATIVE

A mysterious Mossad agent offers you a lucrative contract to infiltrate a terrorist organization's crypto wallet. The mission is highly classified, and failure means disavowal. Are you willing to take the risk for national security?

HIGH RISK // HIGH REWARD

CIA HANDLER

A CIA operative reaches out through encrypted channels with an offer you can't refuse. They need someone who can break into a hostile nation's blockchain network and leave no trace. This isn't just about money—it's about global security.

GOVERNMENT CONTACT

EX-GIRLFRIEND

Your ex-girlfriend—now a powerful executive at a cybersecurity firm—contacts you with a desperate plea. She needs your help to recover stolen crypto assets, but there's more to the story than she's telling you. Old flames and new lies create a dangerous mix.

PERSONAL CONNECTION

HACKER COLLECTIVE

A notorious hacker group has been watching your work. They're impressed and want you to join their cause: targeting corrupt corporations that exploit user data for profit. The job doesn't pay well, but the moral reward might be worth it.

UNDERGROUND NETWORK

CORPORATE EXECUTIVE

A Fortune 500 company's CTO discreetly approaches you with a proposition. Their competitor has stolen proprietary blockchain technology, and they want you to recover it before the IPO. The pay is excellent, but corporate espionage carries serious legal risks.

CORPORATE INTRIGUE

SHADOW LAWYER

A well-connected lawyer with ties to the digital underworld offers you a contract. Their client—whose identity remains confidential—needs access to specific wallets containing evidence of financial crimes. The legal implications are murky, but the payment is crystal clear.

LEGAL GRAY AREA