Explore the intricacies of our game's development process, from conceptualization to implementation. Gain insight into the planning and discussions that shaped our game's design, featuring blueprints of level layouts and sketches detailing gameplay elements.
This section outlines the core mechanics of the game I specifically worked on.
The player has a limited time to stop enemies from hacking the main shipping area.
Implemented a timer mechanic where the player needs to reach the hacking area within a specific time limit.
Tested and iterated on the timer system to ensure balanced gameplay and appropriate difficulty level.
Designed stealth mechanics where the player can hide behind obstacles and use vents for navigation.
Implemented crouching, hiding, and vent crawling mechanics to enhance stealth gameplay.
Tested and refined stealth mechanics to ensure smooth player experience and balanced difficulty.
Designed a hacking mechanic where the player can remotely access cameras to gather information.
Implemented a hacking interface and proximity-based camera interaction system.
Tested and adjusted hacking mechanics for usability and effectiveness in gathering intel. Additionally, incorporated camera proximity mechanics to require the player to be in close range for camera hacking.
Designed areas with electric fences and cameras equipped with defensive capabilities to enhance player challenge and strategy.
Implemented electric fences as environmental hazards and cameras with shooting lasers to stun enemies.
Tested electric fence mechanics for player interaction and camera defense effectiveness in deterring enemy movement. Iteratively refined mechanics to balance challenge and player experience.
Designed a hacking minigame where the player must remember and mimic a sequence of button presses.
Implemented a Simon Says-style hacking minigame with increasing difficulty levels.
Tested and adjusted the Simon Says Hack minigame to ensure it provides a challenging yet enjoyable experience.
© 2024 by Your Name | All images, logos, and names are used with permission