A downloadable game for Windows and macOS

Game made for the Ludum Dare 37 Jam

Want our game in your site? Send us a PM and we'll gladly talk about it, we can brand and sitelock the game.

Ludum Dare 37 entry here!
CODE RED is an action platformer where you take control of an specimen that has escaped out of his containment chamber needing something, nourish yourself with human flesh while your mind is stormed with the need of reaching a room.

Low-code programming for event-driven applications javascript node-red low-code openjs-foundation JavaScript Apache-2.0 2,309 11,494 148 (2 issues need help) 55 Updated Feb 5, 2021. Browse articles about LG product repair information, installation guides, troubleshooting, how-to-use and other useful tips for your LG appliances and devices. NodeMCU is an open-source firmware and development kit that helps you to prototype or build IoT products. It is based on the lowest cost WI-FI MCU ESP8266, ESP8266 is about $2 and once it comes as NodeMCU easy to prototype development kit you can purchase for about $4 something you can connect to your USB and start playing with it. How to install Focusrite drivers on Windows; Where can I download the drivers for my Focusrite interface? How to uninstall Focusrite drivers on Windows; How to set up your audio interface in OBS (Open Broadcaster Software) on Windows; How to set up your audio interface in OBS (Open Broadcaster Software) on a Mac. This project is titled Code Red zip download DOWNLOAD HERE. Code Red zip album download drops at midnight t onight and now, the full tracklist is here. Last night, Moneybagg released his “Said.

Tips:

Code
  • You can slash while you're running
  • You can slash while jumping
  • Eat to regain health.
  • While you're screaming you're invulnerable.
Drivers

Controls:

  • W,A,S,D to move (or arrow keys)
  • Shift to walk
  • H (or C) to slash
  • J (or X) to Grab and eat
  • K (or Z) to scream
  • Jump agaisnt wall to climb
  • Esc or P to pause


Check out web versions

Newgrounds Version - 4~/5, featured and got top 2th the day it was released!

Kongregate Version - 3.6~/5, featured and badged.

ArmorGames Version- 83~/100, featured in frontpage.


The team

  • Graphics - Level design: @veryeviltomato
  • SFX:@eDark95
  • Programming: @Oultrox


ST credits:

  • Welcome to chaos - Ross Budgen.


Wish we had more time to polish the game haha.

StatusReleased
PlatformsWindows, macOS
Rating
AuthorLonely Moon Games
GenrePlatformer
Tags16-bit, 2D, Action-Adventure, Fast-Paced, Gore, Ludum Dare 37, Pixel Art
LinksLudum Dare

Download

Click download now to get access to the following files:

Code red v4.0 - Post Jam MacOSX64 Version (Beta)67 MB

Log in with itch.io to leave a comment.

Love the game but BRUHHHHH the theme is sooooo amazing, can u make a download link for the theme plz

I still want to see a longer version of this game :))

Still love this game

I made a speedrun.com profile for it a while back. Wish we had more runners!

Send a message in the forum if you ever plan to release more Code Red related gameplay!

Glad you enjoyed it bro! btw it turned one year old yesterday hahaha .

Somwhow this game almost gave me the feels....idk how.....

oH! I think I know why, I uploaded that as a .rar, must be .zip, let me try that.

Please try now, IF isn't working, well, I don't know what could be happening, guess I could left the previous version online while I try another solution. I haven't Mac so that's why it's a BETA. I didn't know you were using OSX lol!

Hey man! Love the art style here! I'll say something that probably nobody has said before and what is the main reason this game is fun - good graphic design.

Violent game, dominantly red, supporting colour black associated with negative emotions. It's a really nice touch to combine to make the graphic theme match the game theme and one that many game makers never think about. Good job!

Why no web version tho?

Wow! Thank you so much for such kind and great review!
there are web versions, but not here haha, I Like to only get my .exes here in Itch.io. I'm more like a .exe guy.
Take a look at these links:
http://www.kongregate.com/games/oultrox/code-red?h...
http://www.newgrounds.com/portal/view/685819

Are you the guy from Hug me I'm cold? yes you are hahaha! Loved your game. even I got kinda depressed lol

Haha then my game did its job! Good luck on your next games!

Did you take inspiration off of the LD 34 game LadyBug by any chance? I can't help but feel like this game is too similar for it to be a coincidence :P interesting visual style choice though, kinda reminds me of The Final Station.

I thought the same thing! Feels a lot like LadyBug, just with less ceiling climbing

Oh, I didn't know about that game! but it seems to be an awesome game. we just thought 'hey, let's make the bad guy the protagonist!' and the ideas came from that decisition hahaha. we first thought that the main character should be an Zombie but then the idea itself didn't convice us for us so we thought 'Hey, why not a badass monster from an experiment lab?' and that quite liked us!

Edit: LadyBug it's PRETTY similar haahaha wow! even the blood lols. what a coincidence!
Edit 2: Your artstyle is pretty beatiful Makorie, any chances to make a portrait of me? :P hahaha

glad you like my art :) (and if you were being serious about that request, feel free to e-mail me and we can work something out-.)

And ah, interesting. Think it was a good decision to work with a monster figure than a zombie honestly, heh- regardless, congrats on making a game for a game jam! I hope this game and your team get more support in the future-.

Probably will do then! and Thank you! indeed the game has some good reception, people actually liked this game! we're going to probably work on more deeply in this project once we finish another one. Code red even got a honored mention right here:

(Wish they could have recorded something more interesting and updated but heck! still being great.)

Also got featured in Newgrounds, Kongregate and we got top 83 out of 1600+ entries of the game jam.

So much fun! After the first play through I realized this would be a perfect speed-running game so I've been playing it over and over again. Got my time down to around 2:56:12 after my 5th or 6th run. I'll keep updates on this. Hopefully I'll get it down to 2:20 and maybe 2:00.

EDIT: I got 2:46:84

EDIT: I GOT 2:18:69!!! I know 2:00:00 is possible; needs a 0 death play-through though.

LMAO 2 Minutes. I'm at (roughly) 2:18 right now, mainly because I found a bunch of shortcuts thanks to the wall jump mechanic. Hopefully I'll get it down to ~2 min. this weekend.

Code Red Driver Download For Windows

This is pretty cool! you should record it! and also I have to update this build. between today and tomorrow I'll implement some hotfixes.

O_O There's a physics bug that makes you fall like 3x faster. Haven't figured out how to exploit it, but you might wanna look into that. Happens when I walljump/fall.

Indeed, wall climbing should be more polished with the hotfix I'm going to implement today!

Update implemented!
Code red .exe 4.0:
More smoothly movement in-aire since I reduced the gravity, instant wall climbing without delays and weirds glitchy things, so now it should be just fine.
Thanks for staying tuned with the game!

Code Red Driver Download for windows

Really had fun with Code Red. I hope you'll get to come back to the project and expand on it. :)

Hey, when I launch it says:


Profile error occurred

Something went wrong when opening your profile. Some features may be unavailable.


And then it opens up nw.js any help? The thing said profile error so I don't know if it has anything to do with the game.

Heya man, how did you triggered this error? Can you please send me and email explainning your error? [email protected] is my email

(The problem was an conflict with the profile rights, just right click -> execute as administrator.)

Looks great! Have you got some future plans to turn it into big game?

Thank you so much! we're not sure at the momment bro! but we are so flattered by all the good reception! Maybe soon, we're developing other proyect right now!

Made it in Construct2 and PyxelEdit for the graphics bro!

itch.io·View all by Lonely Moon Games·Report·Embed

Variant:CodeRed F

Worm:W32/CodeRed.F was found spreading in the wild from March 11th, 2003, or more than 18 months after the original CodeRed worm spread across the world faster than any worm before it.

Just like CodeRed II, this worm will install a backdoor to infected web server, enabling any web surfer to easily execute commands on the server by just typing them in a special URL. However, since CodeRed.F still uses the old exploit to infect IIS Web Servers, the number of vulnerable machines is not too high. Most of them are forgotten web servers or home machines without firewall.

This variant will reinfect unprotected IIS Web servers, most of which were already infected earlier by CodeRed II. We're not expecting this to become as big as it was in 2001.

CodeRed.F is almost identical to CodeRed II, with just two bytes changed. CodeRed II stopped spreading in in the end of 2002 - the change in CodeRed.F changes this and enables it to spread forever. Just like CodeRed II, this worm will install a backdoor to infected web server, enabling any web surfer to easily execute commands on the server by just typing them in a special URL.

Removal instructions

Microsoft has shipped a tool to eliminate the obvious damage caused by CodeRed II worm. This tool can be downloaded from: http://download.microsoft.com/download/iis50/Tool/1.0/NT45/EN-US/CodeRedCleanup.exe. More information on the tool from Microsoft site: http://www.microsoft.com/technet/itsolutions/security/tools/redfix.asp


Variant:CodeRed II

Third variant of the Code Red worm has been spreading in the wild since August 4th, 2001. It targets Microsoft IIS www servers, and does not pose a threat to end users. CodeRed II is a rewritten version of the original Code Red worm. It uses the same IIS hole to gain access on the web server and then continues to find new vulnerable systems.

Interestingly, Code Red II has been programmed to spread more aggressively in China than anywhere else. This might be in relation to the Chinese references in the original worm. The most important feature of Code Red II is that it installs a backdoor into systems it infects. This is accomplished by copying the standard Windows NT/2000 command interpreter 'cmd.exe' into web server's 'scripts' directory. As a result, any web surfer can now execute commands on any infected www site just by typing suitable URLs to the web location. Below, a 'DIR' directory listing command has been executed.

Technical details

When a host gets infected it starts to scan for other hosts to infect. It probes random IP addresses but the code is designed so that probing of neighbour hosts is more probable. If the infected system has the language set to Chinese the worm starts more aggressive scanning (600 threads instead of 300). The scanning runs for 24 hours after the infection (48 for Chinese machines) and then the system is rebooted. There is a time limit in the code that will stop the worm on the 1st of October. At that time it will reboot the machine and stop spreading. The installed trojan still remains in the system! The worm drops a trojan program to 'explorer.exe' that modifies different some IIS settings to allow a remote attack of the infected host.

The standard command interpreter 'cmd.exe' is copied to 'inetpubscriptsroot.exe' and to 'progra~1common~1systemMSADCroot.exe'. The worm creates these files to both 'C:' and 'D:' drives if they exist. These copies of the 'cmd.exe' will allow any attacker to execute commands on the remote system really easily.

Trojan part of the code

First of all it disables the System File Checker (SFC) functionality in Windows. SFC is responsible for checking the integrity of system files. Two new root directories are added to the IIS configuration: '/c' that points to 'c:' and '/d' that points to 'd:'. This makes sure that even if the copies of 'cmd.exe' the worm made are removed the system can still be compromised.

Modifications to the registry:

'SOFTWAREMicrosoftWindows NTCurrentVersionWinlogonSFCDisable' is set to 0xffffff9d that disables the System File Checker.

',217' is appended to these keys:

  • 'SYSTEMCurrentControlSetServicesW3SVCParametersVirtual RootsScripts'
  • 'SYSTEMCurrentControlSetServicesW3SVCParametersVirtual RootsMSADC'

These keys make 'C:' and 'D:' accessible trough the webserver:

  • 'SYSTEMCurrentControlSetServicesW3SVCParametersVirtual RootsC'
  • 'SYSTEMCurrentControlSetServicesW3SVCParametersVirtual RootsC'

Removal instructions

First apply the necessary security patches from Microsoft:

  • http://www.microsoft.com/technet/security/bulletin/ms01-033.asp
  • http://www.microsoft.com/technet/security/bulletin/MS00-052.asp

The first one fixes the vulnerability the worm uses to spread. The second one fixes the problem that makes Windows to run the trojanized 'explorer.exe' from the root folder. Both patches must be applied. When the patches are applied the system has to be rebooted to eliminate the worm itself if it was still active. The following files must be deleted:

  • 'inetpubscriptsroot.exe'
  • 'progra~1common~1systemMSADCroot.exe'
  • 'explorer.exe'

These keys have to be removed:

  • 'SYSTEMCurrentControlSetServicesW3SVCParametersVirtual RootsC'
  • 'SYSTEMCurrentControlSetServicesW3SVCParametersVirtual RootsD'

The added ',217' string has to be removed from these keys:

  • 'SYSTEMCurrentControlSetServicesW3SVCParametersVirtual RootsScripts'
  • 'SYSTEMCurrentControlSetServicesW3SVCParametersVirtual RootsMSADC'

A tool to perform the forementioned actions is available at:

  • ftp://ftp.f-secure.com/anti-virus/tools/f-codered.zip

Optionally, the contents can be downloaded from:

  • ftp://ftp.f-secure.com/anti-virus/tools/f-codered.exe
  • ftp://ftp.f-secure.com/anti-virus/tools/f-codered.txt

Code Red Driver Download For Windows Desktop

The backdoor components that the worm drops into infected system are detected by F-Secure Anti-Virus with updates released at August 5th, 2001.


Variant:CodeRed.A

This is original Code Red web worm, found originally in July 2001.

UPDATE ON 1ST OF AUGUST, 2001 By 15:00 GMT,

15 hours after widespread Code Red infections restarted, the situation is getting rapidly worse. The worm has gone worldwide again, infecting vulnerable web sites at an increasing rate. The number of infected servers almost doubles every hour, and has passed 20,000 infected machines. On comparison, on 19th of July, Code Red infected around 300,000 servers, and was only stopped because the worm stopped infections by itself. This time around the worm won't stop spreading for another three weeks.

UPDATE ON 1ST OF AUGUST, 2001 By 12:00 GMT,

Code Red Driver Download For Windows 10

12 hours after the new spreading phase for the Code Red worm restarted, no visible effects of the worm could be seen. The worm did restart spreading, as feared, but initial rate of infections was not very fast. The worm might gain more ground later on, but it's likely that the number of reinfected web servers will be lower than in July, and effects of the worm to general public will be minimal.

Code Red Driver Download For Windows 8.1

Basic information on the Code Red worm

Code Red is a worm that exploits a security hole in Microsoft Internet Information Server (IIS) to spread. When it infects a server it starts to scan for other vulnerable servers and infects them. During a certain period of time the worm only spreads, then it initiates a Denial-of-Service (DoS) attack against www1.whitehouse.gov and finally suspends all the activities.

Code Red Driver Download For Windows 7

This repeats every month. The time zone in the above picture is GMT. The worm can resume into infection phase at midnight July 31st, if there is infected servers in the Internet with incorrect date settings causing that they already are scanning for vulnerable hosts; or the worm is restarted manually by a malicious party. The front page of an infected server might have been changed by the worm to following:

Removal instructions

Windows Drivers For Windows 10

Apply the security patch for this vulnerability from http://www.microsoft.com/technet/security/bulletin/ms01-033.asp. Then reboot the server. Since the worm's code is not written to a hard disk (it exists only in memory) rebooting will eliminate the infection completely.

Coments are closed

Most Viewed Posts

Scroll to top