Hackers have encrypted your data and it's your job to hack them back. Explore a procedurally generated network using an arsenal of terminal commands to find the encryption key.