Babble Software Text Dolphin Info Image Gallery Forums HOME

Creature of the Maze 3 - v95


Ko-Fi icon

If this software is cool or useful to you, consider buying me a coffee on Ko-Fi! There is *no* need to pay to download and enjoy this software! But a couple of dollars would be really appreciated! :)

0 downloads this week
85 downloads total
windows.gif   Download source and code for Windows (124.5 k)  

This game was a little dungeon crawler door game for PC and Amiga BBS systems where you traverse a 75x75x10 dungeon, using weapons, armor and magic to reach the lowest level and the boss creature therein.

The gimmick was that the winner got to become the next creature. You could also (iirc) attack other players if you came across them in the maze, although it was not multiplayer at the same time.

This version is compiled for Windows and runs in a command prompt, but will still require some setup to work. Source is included. It should compile for any system with a standard output console.

Ko-Fi icon

Take my survey
and help choose my next projects
(survey is non-commercial, it's just for my curiousity ;) Thanks!)

Title:Creature of the Maze 3
Last Update:2015-12-15

<-- Previous software in Windows (CopyNew)Next software in Windows (Dashboard) -->
<-- Previous software in All (CopyNew)Next software in All (Crystal Quest 2) -->

Back to Software Menu

Babble Software Text Dolphin Info Image Gallery Forums HOME

This page belongs to
Do not expose to direct sunlight.
Email addresses are provided for personal contact only. The operator of this website will not give, sell, or otherwise transfer email addresses maintained by or for this website to any other party for the purposes of initiating, or enabling others to initiate, unsolicited electronic mail messages. This site does not make use of targetted advertising nor does it store cookies on your device nor does it use unique identifiers to track you. It serves you data and walks away. Only the sole system administrator has access to that data, which consists of your IP address and the data you requested. These logs are automatically deleted whether they have been reviewed or not, and are not used for any further purpose.