\ Axonius: Signal vs Noise | Wells Montague
WM
Axonius Game Project
Concept page / project in motion

Axonius:
Signal vs Noise

An action-driven side-scrolling game concept built around visibility, control, and bringing order to chaotic environments. This project begins as a written showcase and visual gallery, and will later expand into original artwork, sprite work, enemy concepts, and a final playable build.

High-resolution concept art first. Gameplay systems and 8-bit production later.

Project overview

The game turns security and asset-visibility themes into a chapter-based action experience. Each chapter represents a different operational domain, with its own environment, enemy design language, and boss encounter.

Genre

Side-scrolling action shooter with platforming, scanning, movement-based combat, and enemy encounters that reinforce each chapter’s theme.

Visual direction

Dark, high-contrast environments with clean silhouettes, orange signal accents, blue scanning energy, and layered digital worldbuilding.

Narrative arc

The Operator moves from fragmented visibility toward full system clarity, ending in a final showdown against a force built from noise, hidden systems, and disorder.

Main character: The Operator

The Operator is the central character of Signal vs Noise — built to feel grounded, readable, and visually strong as the project evolves from concept art into a full game.

Main character artwork

The Operator

The Operator is a bearded hero wearing a black hoodie marked with a bold orange-and-white chest emblem, blue jeans, and orange-accented sneakers. His silhouette is designed to be memorable in high-resolution artwork now and adaptable later for sprite work and animation.

He moves through broken environments with a scanning pulse and a futuristic phaser weapon, restoring visibility and control across fragmented digital worlds.

This character anchors the entire project visually and narratively, serving as the player’s guide through hidden systems, unstable environments, and increasingly dangerous enemies.

The Operator main character artwork

Chapter summaries

Each chapter is designed to stand on its own visually and mechanically while contributing to the full arc of the game.

Chapter 1

Cyber Asset Management — The Inventory Collapse

A fragmented world filled with hidden devices, incomplete records, and systems that exist outside visibility. The player restores order by scanning the environment, revealing Ghost Devices, and stabilizing the inventory layer by layer.

As visibility improves, a second class of threat emerges: Rogue Terminals — systems that appear known but are actually corrupted, misconfigured, or operating outside of control. These terminals anchor sections of the environment, attack with patterned bursts, and force the player to navigate space more carefully.

As instability increases, Duplicate Entities begin to appear — conflicting versions of the same asset that split, overlap, and multiply. These entities turn one threat into many, forcing the player to resolve identity conflicts while maintaining control of the environment.

As the inventory layer destabilizes further, Orphan Nodes begin to appear — drifting systems with no ownership or accountability. These floating entities disrupt platforms, interfere with scanning, and attack from above, forcing the player to adapt to threats beyond the ground layer.

Together, Ghost Devices, Rogue Terminals, Duplicate Entities, and Orphan Nodes represent the full spectrum of asset risk — from completely unknown systems, to corrupted known assets, to conflicting data, to unowned systems with no control boundary. Mastering all four is key to restoring clarity, control, and stability across the inventory layer.

Focus: visibility foundation · unknown assets · discovery
Chapter 2

Exposures — The Vulnerability Storm

A hostile zone where vulnerabilities, threats, and misconfigurations collide. The player must survive escalating attacks while learning to identify what matters most under pressure.

Focus: risk prioritization · exploit pressure · survival
Chapter 3

Identities — The Access Maze

A shifting labyrinth of users, credentials, and trust relationships. Locked routes, deceptive pathways, and compromised access patterns create a world where identity determines movement and danger.

Focus: access control · privilege sprawl · relationship mapping
Chapter 4

Software Management — The Patchwork World

A broken software landscape full of inconsistent versions, unstable installations, and corrupted environments. The player brings order back to a fragmented stack while fighting through decay.

Focus: patching · version drift · standardization
Chapter 5

SaaS Management — Shadow Cloud City

A skyline of disconnected applications, hidden tenants, and unauthorized services. The player uncovers shadow systems and regains control across a sprawling cloud ecosystem.

Focus: SaaS sprawl · app discovery · hidden integrations
Chapter 6

Cyber Physical Assets — The Industrial Grid

A dangerous mechanical zone of controllers, sensors, industrial systems, and connected devices. Cyber and physical threats blend into one environment where movement and timing become critical.

Focus: OT / IoT · industrial risk · environmental danger
Final Chapter

The Big Boss — The Noise Core

The final encounter merges every previous threat into one collapsing dimension. Hidden assets, active exposures, uncontrolled identities, unmanaged software, shadow SaaS, and hostile cyber physical systems converge into a single force of chaos.

Focus: total disorder · clean data vs noise · final showdown

Chapter 1: Cyber Asset Management

A fragmented world filled with hidden devices, incomplete records, and systems that exist outside visibility. The Operator restores order by scanning, revealing threats, and stabilizing the inventory layer.

Chapter 1 introduces multiple forms of asset chaos: Ghost Devices that remain hidden until revealed, Rogue Terminals that appear known but have become corrupted and hostile, Duplicate Entities that split identity across conflicting records, and Orphan Nodes that drift without ownership or accountability. Together, they turn visibility, accuracy, and control into the core challenge of the level.

Ghost Device
Enemy Type

Ghost Device

Invisible and unmanaged, Ghost Devices flicker in and out of reality. They cannot be engaged until revealed, making them unpredictable threats.

View Details →
Rogue Terminal
Enemy Type

Rogue Terminal

A corrupted machine that controls space and attacks with patterned bursts. It represents systems that look known but are unstable and dangerous.

View Details →
Duplicate Entities
Enemy Type

Duplicate Entities

Conflicting copies of the same asset, Duplicate Entities split, overlap, and destabilize the inventory layer by turning one threat into many.

View Details →
Orphan Node
Enemy Type

Orphan Node

A floating, unowned system fragment that disrupts the environment with unstable energy pulses. It drifts above the battlefield, forcing the player to adapt to threats beyond the ground.

View Details →

What comes next

This page is structured to grow into a larger project showcase without needing a redesign.

Original artwork

Character art, enemy concepts, chapter illustrations, environment mockups, and visual studies that establish the project’s tone and identity.

Gameplay direction

Refined movement, enemy behaviors, scanning mechanics, level interactions, and boss encounters built around each chapter’s core theme.

Final playable build

A future hosted build that turns this concept page into a complete project trail from initial idea to finished interactive experience.