Immerse yourself in the thick of things and join the fights with random opponents from around the world, or invite your friends and play together! Choose your fighter out of four! Each has its own unique characteristics, shock, skills and abilities. The game has a unique and very original design, which combines fantasy, horror and fighting! Game developers have provided competent pumping system in improving the characteristics of the character that fits the genre of RPG. You will be able to develop all of the most powerful features of your character. By managing the game developers also came very well and did not make the standard buttons on the screen that obscured a part of the process, you will be able to manage and execute blows the whole combo with simple taps on the sensor, with a certain interval! Become a champion of the game Fright Fight ™!
Features Fright Fight ™:
Unique online multiplayer fighting game with the possibility of up to 4 players!
4 fighters to choose from: a werewolf, a vampire girl, death, and the Yeti. Everyone has their own unique abilities and strikes!
Excellent combat system allows you to make the whole combination strikes and whirlwinds!
High-quality graphics and character animation in high definition!
RPG elements, you can pump your character, unlock new abilities and strikes!
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to write to the USB storage.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.
Allows the app to prevent the device from going to sleep.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
Allows the app to control the vibrator.
Allows the app to read the contents of your USB storage.
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to write to the USB storage.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.
Allows the app to prevent the device from going to sleep.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
Allows the app to control the vibrator.
Allows the app to read the contents of your USB storage.
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to write to the USB storage.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.
Allows the app to prevent the device from going to sleep.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
Allows the app to read the contents of your USB storage.
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to write to the USB storage.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.
Allows the app to prevent the device from going to sleep.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
Allows the app to read the contents of your USB storage.
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to write to the USB storage.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.
Allows the app to prevent the device from going to sleep.
Allows the app to read the contents of your USB storage.
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to write to the USB storage.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.
Allows the app to prevent the device from going to sleep.
Allows the app to read the contents of your USB storage.
Attention! All files represented on this site either were found freely distributed on the internet or by their authors’ permission. If any of materials on this site violates your rights,
report us