ShockMaze
- Downloads:
- Views:
- Rating:

A vertical scrolling shooter look-alike.
First place winner of the June 2009 GameJolt "Shocking" competition :)
Find your way through the maze : bumping into walls gives you speed and shocking power.
Shooting at ennemies makes them grow bigger in size (and points).
To kill them, you have to shock'em up.
Collect stars and find the 5 ships hidden in each level, (F1 for statistics).
Use a Gamepad or the keyboard.
KEYBOARD CONTROLS :
* Arrow keys : move
* X : shoot.
* C : stop
The 4 first levels are unlocked, so you can clear them separately to access the next ones.
Graphically, the game is in 2.5D and uses strictly 2 colors (transparency is obtained by flickering). Press F3 to change the colors.
Left click to drag the window, right click to select the display.
Free download from Shareware Connection - A vertical scrolling shooter look-alike
Version: 1.0 | Size: 2150 KB | Platform: Win2000, WinOther
Released Date: | Rating: 0 | Title: ShockMaze
Author Url: http://gamejolt.com/
Program Info Url: http://gamejolt.com/
Download Url: http://gamejolt.com/data/games/375/files/ShockMaze.exe
Laser Warp - A little shmup about the dangers of warp travel.
The Orb Carrier - The Orbs.
Thunder Gun - Thunder gun is my submission to the Shocking Competition.
Duum Mashine - Duum Mashine is pretty much what I'd imagine to be every small child's dream.
cybersolip - originally made for a poppenkast competition, then improved
18 Wheels of Steel Convoy
RESCUE'EM
Chicken Invaders 3
WW2 Pacific Heroes
Star Defender 3
Ms. Pacman
Alice Greenfingers
Contra Game
Quake I port for Nokia N70
Jets'n'Guns GOLD
Magic Ball 2
Heavy Weapon
Tower Defence
Super Mario: Kamek - Magikoopa's Revenge
Adventure & RPG
Arcade
Board Games
Cards, Casino & Lottery
Educational
Fantasy Games
Game Guides
Kids
Patches & Updates
Personal Tech Solutions
Puzzles
Simulations
Sports
Strategy & War
Best Vertical Scrolling Shooter Pc
Classic Vertical Scrolling Shooter
Arcade Vertical Scrolling Shooter
Alien Shooter Alike Games
Scrolling Shooter Pc
Window Information - Window Information (TWindowInformation component) is a useful utility that gives you the possibility to find any window in the system and analyze it with VCL-friendly TWindow class which allow to access window data with simple VCL-friendly properties
Access Workgroup Password Recovery - Access Workgroup Password Recovery is a program to recover lost or forgotten passwords for Microsoft Access workgroup files. (*.mdw, *.mda). All passwords are recovered instantly regardless of length. All versions of Microsoft Access are supported.
DBSync for MS Access & MS FoxPro - DBSync for MS Access & MS FoxPro is an easy-to-use database migration tool that helps you synchronize and convert from:· MS Access to MS FoxPro· MS Access to MS Access· MS FoxPro to MS Access· MS FoxPro to MS FoxPro·
Advanced Access Repair Program - Corrupt access database .
Recovery for Access - Recovery for Access repairs corrupted Access databases (.mdb, .mde, .mdw, .mda, .accdb, .accde). Supported Access versions: 2010, 2007, 2003, 2002, 2000, 97, 95 and 2.0. The recovered data is saved into a new Access database.
Shareware Connection periodically updates pricing and software information of 'ShockMaze' from company source 'Lucent Web Creative, LLC' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft, Using 'ShockMaze' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of ShockMaze.
BitKiller - Dealing with various types of data efficiently holds the key to success in any computing task. Apart from generating new data and modifying existing files, it becomes necessary to delete existing files at times. While most users resort to using ...
Driver Fusion - To keep your laptop and desktop running smoothly and get the best performance out of it, it is important to pay attention to some aspects. It is quite important to ensure your PC device drivers are updated. Components like motherboards, GPU and ...
Style Jukebox - No matter if you use a computer for personal needs or work in a networked setup, listening to music is commonplace. It is required for relaxation amidst work and nearly every user indulges in it. For music playback on PC, the WMP is not the only ...
PhoXo - Even a few years back, it was mostly graphic design professionals or people involved in print media were seen using image editing applications. With digital camera prices nose-diving and mobile imaging reaching new heights, things have undergone ...
Qustodio Free Parental Control - Without using the Internet, it is extremely difficult to obtain information, seek entertainment or look for study references but there is a downside to it as well. While some tech savvy kids master the tricks to bypass monitoring of their parents ...
Internet Explorer 10 - Up to the late 1990s, the web browser used by the bulk of Windows users was invariably Internet Explorer while Netscape played the second fiddle. The scene was relatively identical post 2000 but emergence of Firefox and later Google Chrome ...
Impulse Media Player - To play back media files including media and video content, you need to use suitable software. For a majority of Windows users, the integrated WMP is the default choice. However, you can also pick from so many third party music and media playback ...
Hanso Player - Using a media player application to play back music files is something nearly every PC user needs to do. There are so many applications that the abundance can leave average users somewhat puzzled. If the bundled WMP does not suit your taste but ...
Privatefirewall - Everything in life has two sides to it and same can be said about technological innovations. It is quite hard to carry out most activities without resorting to the web these days. Yet the internet itself is also the reservoir of malicious ...
Norton Power Eraser - Getting rid of malware and other types of rogue applicationlications with a regular antivirus can prove to be a tough task nowadays. The way malicious users are becoming smarter with time; it makes sense to use an additional layer of protection ...


