''NetHack'' is an
open source single-player
roguelike video game
Video games, also known as computer games, are electronic games that involves interaction with a user interface or input device such as a joystick, game controller, controller, computer keyboard, keyboard, or motion sensing device to gener ...
, first released in 1987 and maintained by the NetHack DevTeam. The game is a
fork of the 1982 game ''
Hack'', itself inspired by the 1980 game ''
Rogue
A rogue is a person or entity that flouts accepted norms of behavior.
Rogue or rogues may also refer to:
Companies
* Rogue Ales, a microbrewery in Newport, Oregon
* Rogue Arts, a film production company
* Rogue Entertainment, a software com ...
''. The player takes the role as one of several pre-defined
character classes to descend through multiple dungeon floors, fighting monsters and collecting treasure, to recover the "Amulet of Yendor" at the lowest floor and then escape.
As an exemplar of the traditional "roguelike" game, ''NetHack'' features
turn-based, grid-based
hack and slash dungeon crawling gameplay,
procedurally generated dungeons and treasure, and
permadeath, requiring the player to restart the game anew should the
player character die. The game uses simple
ASCII
ASCII ( ), abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication. ASCII codes represent text in computers, telecommunications equipment, and other devices. Because ...
graphics by default so as to display readily on a wide variety of
computer displays, but can use
curses with
box-drawing characters
Box-drawing characters, also known as line-drawing characters, are a form of semigraphics widely used in text user interfaces to draw various geometric frames and boxes. Box-drawing characters typically only work well with monospaced fonts. ...
, as well as substitute graphical tilesets on machines with graphics. While ''Rogue'', ''Hack'' and other earlier roguelikes stayed true to a
high fantasy setting, ''NetHack'' introduced humorous and
anachronistic elements over time, including
popular cultural reference to works such as ''
Discworld'' and ''
Raiders of the Lost Ark''.
It is identified as one of the "major roguelikes" by John Harris. Comparing it with ''Rogue'', ''
Engadget''s Justin Olivetti wrote that it took its exploration aspect and "made it far richer with an encyclopedia of objects, a larger vocabulary, a wealth of pop culture mentions, and a puzzler's attitude." In 2000, ''
Salon'' described it as "one of the finest gaming experiences the computing world has to offer".
Gameplay
Before starting a game, players choose their character's
race,
role,
sex, and
alignment, or allow the game to assign the attributes randomly. There are traditional fantasy roles such as
knight,
wizard,
rogue
A rogue is a person or entity that flouts accepted norms of behavior.
Rogue or rogues may also refer to:
Companies
* Rogue Ales, a microbrewery in Newport, Oregon
* Rogue Arts, a film production company
* Rogue Entertainment, a software com ...
, and
priest
A priest is a religious leader authorized to perform the sacred rituals of a religion, especially as a mediatory agent between humans and one or more deities. They also have the authority or power to administer religious rites; in particu ...
; but there are also unusual roles, including
archaeologist,
tourist
Tourism is travel for pleasure or business; also the theory and practice of touring, the business of attracting, accommodating, and entertaining tourists, and the business of operating tours. The World Tourism Organization defines tourism ...
, and
caveman. The
player character's role and alignment dictate which
deity the character serves in the game, "how other monsters react toward you", as well as character skills and attributes.
After the player character is created, the main objective is introduced. To win the game, the player must retrieve the Amulet of Yendor, found at the lowest level of the dungeon, and offer it to their deity. Successful completion of this task rewards the player with the gift of
immortality, and the player is said to "ascend", attaining the status of
demigod
A demigod or demigoddess is a part-human and part-divine offspring of a deity and a human, or a human or non-human creature that is accorded divine status after death, or someone who has attained the " divine spark" (spiritual enlightenment). ...
. Along the path to the amulet, a number of sub-quests must be completed, including one class-specific quest.
There are 3 major antagonists in NetHack; the Luciferesque god Moloch, who stole the Amulet Of Yendor from the
creator god
A creator deity or creator god (often called the Creator) is a deity responsible for the creation of the Earth, world, and universe in human religion and mythology. In monotheism, the single God is often also the creator. A number of monolatris ...
Marduk, the high priest/priestess of Moloch, who holds the Amulet of Yendor, and the most prominent antagonist, the Wizard of Yendor, who will stalk the player throughout the rest of the game after the first encounter by resurrecting and attacking them periodically.
The player's character is, unless they opt not to be, accompanied by a pet animal, typically a
kitten or
little dog, although knights begin with a
saddled
pony. Pets grow from fighting, and they can be changed by various means. Most of the other monsters may also be tamed using magic or food.
Dungeon levels
''NetHacks dungeon spans about fifty primary levels, most of which are
procedurally generated when the player character enters them for the first time. A typical level contains a way "up" and "down" to other levels. These may be stairways, ladders, trapdoors, etc. Levels also contain several "rooms" joined by corridors. These rooms are randomly generated rectangles (as opposed to the linear corridors) and may contain features such as altars, shops, fountains, traps, thrones, pools of water, and sinks based on the randomly generated features of the room. Some specific levels follow one of many fixed designs or contain fixed elements. Later versions of the game added special branches of dungeon levels. These are optional routes that may feature more challenging monsters but can reward more desirable treasure to complete the main dungeon. Levels, once generated, remained persistent, in contrast to games that followed ''
Moria
Moria may refer to:
Arts and entertainment
* Moria (Middle-earth), fictional location in the works of J. R. R. Tolkien
* '' Moria: The Dwarven City'', a 1984 fantasy role-playing game supplement
* ''Moria'' (1978 video game), a dungeon-crawler g ...
''-style of level generation.
Items and tools

''NetHack'' features a variety of items:
weapon
A weapon, arm or armament is any implement or device that can be used to deter, threaten, inflict physical damage, harm, or kill. Weapons are used to increase the efficacy and efficiency of activities such as hunting, crime, law enforcement, ...
s (
melee or
ranged),
armor
Armour (British English) or armor (American English; see spelling differences) is a covering used to protect an object, individual, or vehicle from physical injury or damage, especially direct contact weapons or projectiles during combat, or ...
to protect the player,
scrolls and spellbooks to read,
potions to
quaff, wands, rings, amulets, and an assortment of
tool
A tool is an object that can extend an individual's ability to modify features of the surrounding environment or help them accomplish a particular task. Although many animals use simple tools, only human beings, whose use of stone tools dates ba ...
s, such as keys and lamps.
''NetHack''
's identification of items is almost identical to ''
Rogue
A rogue is a person or entity that flouts accepted norms of behavior.
Rogue or rogues may also refer to:
Companies
* Rogue Ales, a microbrewery in Newport, Oregon
* Rogue Arts, a film production company
* Rogue Entertainment, a software com ...
''
's. For example, a newly discovered potion may be referred to as a "pink potion" with no other clues as to its identity. Players can perform a variety of actions and tricks to deduce, or at least narrow down, the identity of the potion. The most obvious is the somewhat risky tactic of simply drinking it. All items of a certain type will have the same description. For instance, all "scrolls of enchant weapon" may be labeled "TEMOV", and once one has been identified, all "scrolls of enchant weapon" found later will be labeled unambiguously as such. Starting a new game will scramble the items descriptions again, so the "silver ring" that is a "ring of levitation" in one game might be a "ring of hunger" in another.
Blessings and curses
As in many other roguelike games, all items in ''NetHack'' are either "
blessed
Blessed may refer to:
* The state of having received a blessing
* Blessed, a title assigned by the Roman Catholic Church to someone who has been beatified
Film and television
* ''Blessed'' (2004 film), a 2004 motion picture about a supernatura ...
", "uncursed", or "
curse
A curse (also called an imprecation, malediction, execration, malison, anathema, or commination) is any expressed wish that some form of adversity or misfortune will befall or attach to one or more persons, a place, or an object. In particular, ...
d". The majority of items are found uncursed, but the blessed or cursed status of an item is unknown until it is identified or detected through other means.
Generally, a blessed item will be more powerful than an uncursed item, and a cursed item will be less powerful, with the added disadvantage that once it has been equipped by the player, it cannot be easily unequipped. Where an object would bestow an effect upon the character, a curse will generally make the effect harmful, or increase the amount of harm done. However, there are very specific exceptions. For example, drinking a cursed "potion of gain level" will make the character literally rise through the ceiling to the level above, instead of gaining an
experience level.
Character death
As in other roguelike games, ''NetHack'' features
permadeath: expired characters cannot be revived.
Although ''NetHack'' can be completed without any artificial limitations, experienced players can attempt "conducts" for an additional challenge. These are voluntary restrictions on actions taken, such as using no wishes, following a
vegetarian or
vegan
Veganism is the practice of abstaining from the use of animal product—particularly in diet—and an associated philosophy that rejects the commodity status of animals. An individual who follows the diet or philosophy is known as a vegan. ...
diet, or even killing no monsters. While conducts are generally tracked by the game and are displayed at death or ascension, unofficial conducts are practiced within the community.
When a player dies, the cause of death and score is created and added to the list where the player's character is ranked against other previous characters. The prompt "Do you want your possessions identified?" is given by default at the end of any game, allowing the player to learn any unknown properties of the items in their inventory at death. The player's attributes (such as resistances, luck, and others), conduct (usually self-imposed challenges, such as playing as an atheist or a vegetarian), and a tally of creatures killed, may also be displayed.
The game sporadically saves a level on which a character has died and then integrates that level into a later game. This is done via "bones files", which are saved on the computer hosting the game. A player using a publicly hosted copy of the game can thus encounter the remains and possessions of many other players, although many of these possessions may have become cursed.
Because of the numerous ways that a player-character could die between a combination of their own actions as well as from reactions from the game's interacting systems, players frequently refer to untimely deaths as "Yet Another Stupid Death" (YASD). Such deaths are considered part of learning to play ''NetHack'' as to avoid conditions where the same death may happen again.
''NetHack'' does allow players to save the game so that one does not have to complete the game in one session, but on opening a new game, the previous save file is subsequently wiped as to enforce the permadeath option. One option some players use is to make a backup copy of the save game file before playing a game, and, should their character die, restoring from the copied version, a practice known as "save scumming". Additionally, players can also manipulate the "bones files" in a manner not intended by the developers. While these help the player to learn the game and get around limits of permadeath, both are considered forms of cheating the game.
Culture around spoilers
''NetHack'' is largely based on discovering secrets and tricks during gameplay. It can take years for one to become well-versed in them, and even experienced players routinely discover new ones. A number of ''NetHack'' fan sites and discussion forums offer lists of game secrets known as "spoilers".
Interface
''NetHack'' was originally created with only a simple ASCII
text-based user interface, although the option to use something more elaborate was added later in its development. Interface elements such as the environment, entities, and objects are represented by arrangements of
ASCII
ASCII ( ), abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication. ASCII codes represent text in computers, telecommunications equipment, and other devices. Because ...
or
Extended ASCII
Extended ASCII is a repertoire of character encodings that include (most of) the original 96 ASCII character set, plus up to 128 additional characters. There is no formal definition of "extended ASCII", and even use of the term is sometimes critic ...
glyphs, "
DECgraphics", or "
IBMgraphics" mode. In addition to the environment, the interface also displays character and situational information.
A detailed example:
You see here a silver ring.
------------
##....._.....,
, ...........# ------
#..........., , ....,
--------------- ###------------ , ...(,
, ..%..........., ########## ###-@...,
, ...%...........### # ## , ....,
+.......<......, ### ### , ..!.,
--------------- # # ------
### ###
# #
---.----- ###
, ......., #
, ........####
, .......,
, .......,
---------
Hacker the Conjurer St:11 Dx:13 Co:12 In:11 Wi:18 Ch:11 Neutral
Dlvl:3 $:120 HP:39(41) Pw:36(36) AC:6 Exp:5 T:1073
The player (the '@' sign, a wizard in this case) has entered the level via the stairs (the '<' sign) and killed a few monsters, leaving their corpses (the '%' signs) behind. Exploring, the player has uncovered three rooms joined by corridors (the '#' signs): one with an altar (the '_' sign), another empty, and the final one (that the player is currently in) containing a potion (the '!' sign) and chest (the '(' sign). The player has just moved onto a square containing a silver ring. Parts of the level are still unexplored (probably accessible through the door to the west (the '+' sign)) and the player has yet to find the downstairs (a '>' sign) to the next level.
Apart from the original
termcap interface shown above, there are other interfaces that replace standard screen representations with
two-dimensional images, or
tiles, collectively known as "tiles mode".
Graphic interfaces of this kind have been successfully implemented on the
Amiga, the
X Window System
The X Window System (X11, or simply X) is a windowing system for bitmap displays, common on Unix-like operating systems.
X provides the basic framework for a GUI environment: drawing and moving windows on the display device and interacting ...
, the
Microsoft Windows GUI, the
Qt toolkit, and the
GNOME libraries.
Enhanced graphical options also exist, such as the
isometric perspective of ''
Falcon's Eye'' and ''Vulture's Eye'', or the
three-dimensional rendering that noegnud offers. ''Vulture's Eye'' is a
fork of the now defunct Falcon's Eye project. ''Vulture's Eye'' adds additional graphics, sounds, bug fixes and performance enhancements and is under active development in an open collaborative environment.
File:NetHack for Windows Screenshot.png, ''NetHack'' for Microsoft Windows in "tiles mode"
File:Vultures-2.1.0 screenshot.jpg, ''Vulture's Eye'' offers an isometric perspective
File:NeXTSTEP Nethack.png, ''NetHack'' on OPENSTEP/ NeXTSTEP
History and development
''NetHack'' is a software derivative of ''Hack'', which itself was inspired by ''Rogue''. ''Hack'' was created by students Jay Fenlason, Kenny Woodland, Mike Thome, and
Jonathan Payne at
Lincoln-Sudbury Regional High School as part of a computer class, after seeing and playing ''Rogue'' at the
University of California Berkeley
The University of California, Berkeley (UC Berkeley, Berkeley, Cal, or California) is a public land-grant research university in Berkeley, California. Established in 1868 as the University of California, it is the state's first land-grant u ...
computer labs.
[Craddock 2015, Chapter 5: "When the Inmates Run the Asylum - Hack-ing at Lincoln-Sudbury High School"] The group had tried to get the source code of ''Rogue'' from
Glenn Wichman Glenn R. Wichman (born in 1960 in Bay City, Michigan) is a software developer and one of the original authors of the computer game ''Rogue'', along with Michael Toy, Ken Arnold and Jon Lane. Wichman has also contributed to many other commercial sof ...
and Michael Toy to build upon, but Wichman and Toy had refused, forcing the students to build the dungeon-creation routines on their own. As such, the game was named ''Hack'' in part for the hack-and-slash gameplay and that the code to generate the dungeons was considered a
programming hack.
After their classes ended, the students' work on the program also ended, though they had a working game. Fenlason provided the
source code
In computing, source code, or simply code, is any collection of code, with or without comment (computer programming), comments, written using a human-readable programming language, usually as plain text. The source code of a Computer program, p ...
to a local
USENIX conference, and eventually it was uploaded to
USENET
Usenet () is a worldwide distributed discussion system available on computers. It was developed from the general-purpose Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Ellis conceived the idea in 1979, and it was ...
newsgroups. The code drew the attention of many players who started working to modify and improve the game as well as port it to other computer systems.
''Hack'' did not have any formal maintainer and while one person was generally recognized to hold the main code to the current version of ''Hack'', many software forks emerged from the unorganized development of the game.
Eventually, Mike Stephenson took on the role as maintainer of the ''Hack'' source code. At this point, he decided to create a new fork of the game, bringing in novel ideas from
Izchak Miller
Izchak Miller (September, 1935 – April 1, 1994) was a philosopher and author, known, among other things, for his scholarly writings on Edmund Husserl and his contributions to Husserlian phenomenology.
Miller was a coordinator of the Cogniti ...
, a philosophy professor at
University of Pennsylvania
The University of Pennsylvania (also known as Penn or UPenn) is a private research university in Philadelphia. It is the fourth-oldest institution of higher education in the United States and is ranked among the highest-regarded universit ...
, and Janet Walz, another computer hacker. They called themselves the DevTeam and renamed their branch ''NetHack'' since their collaboration work was done over the Internet.
[Craddock 2015, Chapter 6: "It Takes a Village: Raising NetHack"] They expanded the bestiary and other objects in the game, and drew from other sources outside of the high fantasy setting, such as from ''
Discworld'' with the introduction of the tourist character class. Knowing of the multiple forks of ''Hack'' that existed, the DevTeam established a principle that while the game was open source and anyone could create a fork as a new project, only a few select members in the DevTeam could make modifications to the main source repository of the game, so that players could be assured that the DevTeam's release was the legitimate version of ''NetHack''.
Release history
The DevTeam's first release of ''NetHack'' was on 28 July 1987.
The core DevTeam had expanded with the release of ''NetHack'' 3.0 in July 1989. By that point, they had established a tight-lipped culture, revealing little, if anything, between releases. Owing to the ever-increasing depth and complexity found in each release, the development team enjoys a near-mythical status among fans. This perceived omniscience is captured in the initialism TDTTOE, "The DevTeam Thinks of Everything", in that many of the possible
emergent gameplay elements that could occur due to the behavior of the complex game systems had already been programmed in by the DevTeam.
Since version 3.0, the DevTeam has typically kept to minor bug fix updates, represented by a change in the third version number (e.g. v3.0.1 over v3.0.0), and only releases major updates (v3.1.0 over v3.0.0) when significant new features are added to the game, including support for new platforms. Many of those from the community that helped with the ports to other systems were subsequently invited to be part of the DevTeam as the team's needs grew, with Stephenson remaining the key member currently.
Updates to the game were generally regular from around 1987 through 2003, with the DevTeam releasing v3.4.3 in December 2003.
Subsequent updates from the DevTeam included new tilesets and compatibility with variants of Mac OS, but no major updates to the game had been made. In the absence of new releases from the developers, several community-made updates to the code and variants developed by fans emerged.
On 7 December 2015, version 3.6.0 was released, the first major release in over a decade. While the patch did not add major new gameplay features, the update was designed to prepare the game for expansion in the future, with the DevTeam's patch notes stating "This release consists of a series of foundational changes in the team, underlying infrastructure and changes to the approach to game development".
Stephenson said that despite the number of roguelike titles that had emerged since the v3.4.3 release, they saw that ''NetHack'' was still being talked about online in part due to its high degree of portability, and decided to continue its development.
According to DevTeam member Paul Winner, they looked to evaluate what community features had been introduced in the prior decade to improve the game while maintaining the necessary balance.
The update came shortly after the death of
Terry Pratchett
Sir Terence David John Pratchett (28 April 1948 – 12 March 2015) was an English humourist, satirist, and author of fantasy novels, especially comic fantasy, comical works. He is best known for his ''Discworld'' series of 41 novels.
Pratchet ...
, whose ''Discworld'' had been influential on the game, and the new update included a tribute to him.
With the v3.6.0 release, ''NetHack'' remains "one of the oldest games still being developed".
A public read-only mirror of ''NetHack''
git repository was made available on 10 February 2016. Since v3.6.0, the DevTeam has continued to push updates to the title, with the latest being v3.6.6 on 8 March 2020. Version 3.7.0 is currently in development.
, the official source release supports the following systems:
Windows
Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for ...
,
Linux
Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which i ...
,
macOS
macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac (computer), Mac computers. Within the market of ...
,
Windows CE,
OS/2,
Unix (
BSD,
System V,
Solaris,
HP-UX
HP-UX (from "Hewlett Packard Unix") is Hewlett Packard Enterprise's proprietary implementation of the Unix operating system, based on Unix System V (initially System III) and first released in 1984. Current versions support HPE Integrit ...
),
BeOS, and
VMS #REDIRECT VMS
{{redirect category shell, {{R from other capitalisation{{R from ambiguous page ...
.
Licensing, ports, and derivative ports
''NetHack'' is released under the NetHack General Public License, which was written in 1989 by Mike Stephenson, patterned after the
GNU bison license (which was written by
Richard Stallman
Richard Matthew Stallman (; born March 16, 1953), also known by his initials, rms, is an American free software movement activist and programmer. He campaigns for software to be distributed in such a manner that its users have the freedom to u ...
in 1988). Like the Bison license, and Stallman's later
GNU General Public License
The GNU General Public License (GNU GPL or simply GPL) is a series of widely used free software licenses that guarantee end user
In product development, an end user (sometimes end-user) is a person who ultimately uses or is intended to ulti ...
, the ''NetHack'' license was written to allow the free sharing and modification of the
source code
In computing, source code, or simply code, is any collection of code, with or without comment (computer programming), comments, written using a human-readable programming language, usually as plain text. The source code of a Computer program, p ...
under its protection. At the same time, the license explicitly states that the source code is not covered by any
warranty, thus protecting the original authors from
litigation. The NetHack General Public License is a
copyleft
Copyleft is the legal technique of granting certain freedoms over copies of copyrighted works with the requirement that the same rights be preserved in derivative works. In this sense, ''freedoms'' refers to the use of the work for any purpose, ...
software license certified as an
open source license by the
Open Source Initiative.
The NetHack General Public License allows anyone to
port
A port is a maritime facility comprising one or more wharves or loading areas, where ships load and discharge cargo and passengers. Although usually situated on a sea coast or estuary, ports can also be found far inland, such as ...
the game to a platform not supported by the official DevTeam, provided that they use the same license. Over the years this licensing has led to a large number of ports and internationalized versions in German, Japanese, and Spanish.
The license also allows for software forks as long as they are distributed under the same license, except that the creator of a derivative work is allowed to offer warranty protection on the new work. The derivative work is required to indicate the modifications made and the dates of changes. In addition, the source code of the derivative work must be made available, free of charge except for nominal distribution fees. This has also allowed source code forks of ''NetHack'' including ''
Slash'EM'', ''UnNetHack'', and ''dNethack''.
Online support
Bugs, humorous messages, stories, experiences, and ideas for the next version are discussed on the
Usenet
Usenet () is a worldwide distributed discussion system available on computers. It was developed from the general-purpose Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Ellis conceived the idea in 1979, and it was ...
newsgroup rec.games.roguelike.nethack.
A public server at nethack.alt.org, commonly known as "NAO", gives players access to NetHack through a
Telnet or
SSH interface. A browser-based client is also available on the same site. Ebonhack connects to NAO with a graphical tiles-based interface.
During the whole month of November, the annual /dev/null NetHack Tournament took place every year from 1999 to 2016.
The November NetHack Tournament, initially conceived as a one-time tribute to devnull, has taken place each year since 2018.
The Junethack Cross-Variant Summer Tournament has taken place annually since 2011.
NetHack Learning Environment
The
Facebook
Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin ...
artificial intelligence
Artificial intelligence (AI) is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machine
A machine is a physical system using Power (physics), power to apply Force, forces and control Motion, moveme ...
(AI) research team, along with researchers at the
University of Oxford
The University of Oxford is a collegiate research university in Oxford, England. There is evidence of teaching as early as 1096, making it the oldest university in the English-speaking world and the world's second-oldest university in contin ...
,
New York University
New York University (NYU) is a private research university in New York City. Chartered in 1831 by the New York State Legislature, NYU was founded by a group of New Yorkers led by then- Secretary of the Treasury Albert Gallatin.
In 1832, ...
, the
Imperial College London, and
University College London, developed an open-source platform called the NetHack Learning Environment, designed to teach AI agents to play ''NetHack''. The base environment is able to maneuver the agent and fight its way through dungeons, but the team seeks community help to build an AI on the complexities of ''NetHack'' interconnected systems, using implicit knowledge that comes from player-made resources, thus giving a means for programmers to hook into the environment with additional resources. Facebook's research led the company to pose ''NetHack'' as a grand challenge in AI in June 2021, in part due to the game's permadeath and inability to experiment with the environment without creating a reaction. The competition at the 2021
Conference on Neural Information Processing Systems involved agents of various designs attempting to ascend. None of the agents managed this; the results were ranked by median in-game score, with the highest-ranked agent (Team AutoAscend) using a symbolic (non-machine-learning) design.
Legacy
''Nethack'' will be part of the video game exhibit "Never Alone", in the
Museum of Modern Art
The Museum of Modern Art (MoMA) is an art museum located in Midtown Manhattan, New York City, on 53rd Street (Manhattan), 53rd Street between Fifth Avenue, Fifth and Sixth Avenues.
It plays a major role in developing and collecting modern art, ...
's collection, set to run from September 2022 to mid-2023.
See also
*
List of open-source video games
This is a list of notable open-source video games. Open-source video games are assembled from and are themselves open-source software, including public domain games with public domain source code. This list also includes games in which the engine i ...
*
List of roguelikes
This is a selected list of roguelike video games. Roguelike games are those that incorporate elements of role-playing games with procedural generation, following the formula of the genre's namesake, ''Rogue
A rogue is a person or entity tha ...
References
*
Citations
External links
*
*
A Guide to the Mazes of Menace (Guidebook for ''NetHack'')*
*
The NetHack WikiNAO website/dev/null NetHack Tournament*
*
''NetHack''at
SourceForge.net
Hall of Fame – ''NetHack''at
GameSpy
{{DEFAULTSORT:Nethack
1987 video games
Acorn Archimedes games
Amiga games
Android (operating system) games
Atari ST games
Cross-platform software
Fantasy video games
Free and open-source Android software
Games with concealed rules
GP2X games
Linux games
Classic Mac OS games
Open-source video games
MacOS games
Roguelike video games
Role-playing video games
Video games with textual graphics
Windows games
Video games using procedural generation