Tech Wars: Virtual Booster
Tech Wars: Cardlist | Visual spoiler | Export | Booster | Comments | Search | Recent activity |
15 random cards from the set.
You could alternatively have a booster in the usual rarity pattern.
You could alternatively have a booster in the usual rarity pattern.
Strength 0
Purge Threshold 2 Whenever the opponent draws a card, access it unless they pay . , : Search R&D for another card named “Puppyslug”, and deploy it on this site. What has 4 heads, 11 tentacles, and 1024 eyes?
1
|
Strength 0
Purge Threshold 3 Overclocker deploys with 4 damage counters on it. , Remove 1 damage counter from Overclocker: Put 1 damage counter on a resource on this site. You may bring down that resource. 3
|
Damage Threshold 3
At the end of your turn, put any number of cards from your hand under Cold Storage face down. : Return any number of cards from under Cold Storage to your hand. 2
|
Strength -1
Choose an opposing site. You may deploy up to two Malware attacks on that site, reducing the deploy cost of each by . |
Denial of Service costs less for each Link you have.
Choose an opposing site. No actions can be taken on that site for the duration of the next turn. |
Strength 1
Increase the Strength of Break and Enter by X. Gain access to a site for the remainder of the turn. Sometimes brute force is still an efficient way to bypass security.
|
Strength 1
Purge Threshold 2 At the start of each of your turns, put a damage counter on a resource installed in this site. |
Initiate Research Grant only if you have a project in development.
Gain 5 capital. 1
|
Strength 5
Choose one: -Choose a resource and remove 3 development counters from it. Then, if it has no development counters, trash it. -Trash two face-up assets that are assigned to the same site. |
Global
Link +1 Global; Moving resources into a site costs X less capital for each Link on that site. |
Strength -1
Purge Threshold 1 Archive K-9: Bring down a resource on this site. “Where do we find these? I mean, this is just a failed script for process monitoring some intern wrote.”
1
|
When Consulting Contracts is accessed, trash it.
: Gain 2 capital for every development counter on Consulting Contracts, then remove it from the game. You cannot use this ability if Consulting Contracts has any damage counters on it. |
Each site has -1 Security. (This effect does not end at end of turn.) Each player can pay to end this effect on their sites.
“The vulnerability advisory drops on Monday. Get everything patched before then.”
1
|
Strength 3
Put 4 damage counters on a resource your opponent controls, then remove Stiletto from the game. 3
|
Response
Damage Threshold 1 Whenever an attack is made on this site, the opponent may pay . If they don’t, prevent that attack. 2
|
Puppyslug
(none)
Overclocker
(none)
Cold Storage
(none)
Code Injection
(none)
Denial of Service
(none)
Break and Enter
(none)
Static
(none)
Research Grant
(none)
Corporate Terrorism
(none)
Decidicated Network
(none)
K-9
(none)
Consulting Contracts
(none)
Advance Warning
(none)
Stiletto
(none)
Signal Jammer
(none)