Scary as slender.. but not another slender-like! "Eyes is a definite must-have for any fan of horror games." - Bunch of Gamers "Surprisingly innovative and great fun, this game will be soon known by the most of the indie gamers out there, ...Read more
Scary as slender.. but not another slender-like!
"Eyes is a definite must-have for any fan of horror games." - Bunch of Gamers
"Surprisingly innovative and great fun, this game will be soon known by the most of the indie gamers out there, it deserves it." - Creepy Gaming
"Scary game with great graphics!This game is very enjoyable, and its pretty new, so I cant wait to see more awesome updates! One of the best horror games on [...] so far!" - anonymous user
Free first person perspective indie horror game. If you like Slender, you'll like it too.
Search an old, abandoned house and collect any valuables but be careful - there are rumors of a ghost haunting the building. Experience fear and deep horrifying atmosphere.
Do you have a question about this app?
UPDATED ON: Nov 4, 2013
INSTALLATIONS: 5,000,000 - 10,000,000
LATEST VERSION: 2.0.3
REQUIRED ANDROID VERSION: 2.3.3 and up
full Internet access
Allows an application to create network sockets.
view network state
Allows an application to view the state of all networks.
view Wi-Fi status
Allows an application to view the information about the state of Wi-Fi.
prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
automatically start at boot
Allows an application to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down overall performance of the phone by constantly running.
modify/delete SD card contents
Allows an application to write to the SD card.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
precise (GPS) location
Access precise location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
approximate (network-based) location
Access location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
access extra location provider commands
Access extra location provider commands. Malicious applications could use this to interfere with the operation of the GPS or other location sources.