Remember Rick Dangerous?

Way before Lara Croft, back in the 1980's and early 1990's, Rick Dangerous was the Indiana Jones of computer games, running away from rolling rocks, avoiding traps, from South America to a futuristic missile base via Egypt and the Schwarzendumpf castle.

xrick is an exact clone of Rick Dangerous, produced by carefully cracking and reverse-engineering the orignal IBM PC (x86 CPU) and Atari ST (68k CPU) versions of the game, and then porting to C. Thanks to its structure, and the use of the SDL library, it has been reported to run on Linux, Windows, BeOs, Amiga, QNX, etc. and all sorts of gaming consoles, phones and devices.

If you want to read more about Rick Dangerous, you may want to visit Rick Dangerous Resurrected (english) or Rick Dangerous Forever (french). Oh, and, of course, from the original designer and programmer: Simon Phipps' very own Rick Dangerous page.

If you want to read more about xrick, you can visit the original xrick page which will eventually move here. The source code is available in its own GitHub repository.

It has been possible to play Rick Dangerous in the browser for years, thanks to Rick Dangerous Flash but, as the name implies, that requires Flash. Meanwhile, WebAssembly has become more mainstream, and emscripten supports SDL2 out of the box.

Which leads to this site: the WebAssembly port of xrick, in the browser!

You can control Rick Dangerous with the keyboard (S, D, L, O and SPACE) or via the touch pads, on touch devices. All xrick cheat modes (Trainer, Invicible and Highlights) are available.

The best way to contact me would be via and Twitter, @zpqrtbnk.