Zkaiser Posted July 31, 2009 Report Share Posted July 31, 2009 This set is another Machine archetype that focuses on control. Pure control. Any card/effect suggestions or OCG fixes are welcome. I want to make this set really good. Brave HackerDARK/4/1900/800Machine/EffectWhen this card declares an attack, you can discard 1 card to look at your opponent's Hand or Graveyard. If you use this effect, Select 1 monster among the revealed cards and attack it with this monster.(Damage calculation is calculated as though the monster is in Attack Position.) Monsters destroyed by this battle are removed from play. If you cannot select a monster, this card is destroyed. Spell HackerWIND/4/1600/1200Machine/EffectWhen this card is Summoned, Your opponent can and must activate 1 Spell Card from their hand. If they cannot, this card is destroyed. Defense HackerDARK/3/800/1800Machine/EffectWhen this card battles a monster in Defense Mode, the defending monster's DEF is treated as 0 during the Damage Step. This card inflicts piecing damage. Sabotage HackerFIRE/4/1700/100Machine/EffectWhen this card is Normal Summoned, Trap Cards cannot be activated. Once per turn, you can tribute 1 "Hacker" monster you control to destroy 1 Set Spell or Trap Card on the field. Trojan HackerWATER/1/0/0Machine/EffectIf your opponent's monster attacks this face-down Defense Position card, this card becomes an Equip Card equipped to the attacking monster, without applying damage calculation. During the Standby Phase of your opponent's next turn, destroy the equipped monster and your opponent must discard cards equal to the level of the equipped monster. Tactics HackerDARK/2/1000/1000Machine/EffectOnce per turn, you can select 1 monster your opponent controls. During their next turn the Battle Position of the selected monster cannot be changed and they must attack with the selected monster if possible. If they don't your opponent loses life points equal to the selected monsters ATK. Spells: Corrupt Damage FilesQuick-PlayWhile you control a "Hacker" monster(s), your opponent takes all Battle Damage you would receive from battles involving your monsters this turn. data-leech.exeEquipEquip only to a "Hacker" monster. Your opponent must play with their hand revealed. When the equipped monster is sent to the Graveyard, draw 1 card and return this card to the bottom of the Deck. Tuning MalfuntionQuick-PlayActivate only by discarding 2 cards when you control a "Hacker" monster. Return 1 Tuner your opponent controls to it's owner's hand and send 3 monsters from your opponent's Extra Deck to the Graveyard. Incorrect Battle PlansNormalChange the Battle Positions of all monsters your opponent controls (face-down monsters are flipped face-up). If you control a face-up "Hacker" monster, your opponent cannot change Battle Positions until your next Standby Phase. Traps: Destination ReprogrammingCounterActivate only by discarding a card when your opponent Summons a monster while you control a "Hacker" card. If it was a Normal Summon, gain control of the Summoned Monster. If it was a Special Summon, send the Summoned monster to the Graveyard. Field HackerNormalActivate only during your opponent's turn by discarding 1 "Hacker" monster. Look at your opponent's hand. Select 1 monster that can be Normal Summoned and Normal Summon or Set it to your opponent's side of the field. If the monster is level 5 or more, Tributes are required. If you cannot summon a monster, skip your next turn. FirewallContinousWhen you activate this card place 3 Proxy Counters on this card. When a "Hacker" monster you control would be destroyed, you can remove 1 Proxy Counter from this card instead. Link to comment
Bringerofcake Posted August 1, 2009 Report Share Posted August 1, 2009 "This card inflicts piercing damage" = During battle between this attacking card and a Defense Position monster whose DEF is lower than the ATK of this card, inflict the difference as Battle Damage to your opponent. Also, I'd suggest Incorrect Battle Plans to be a Trap instead of a Spell. Makes for an easy attack stopper. Other than that, holy crap this deck controls the game. 8/10. Link to comment
-Griffin Posted August 1, 2009 Report Share Posted August 1, 2009 Piercing damage has been used on official cards, it is presumably acceptable, I use it a lot. Link to comment
Zkaiser Posted August 1, 2009 Author Report Share Posted August 1, 2009 "This card inflicts piercing damage" = During battle between this attacking card and a Defense Position monster whose DEF is lower than the ATK of this card' date=' inflict the difference as Battle Damage to your opponent. Also, I'd suggest Incorrect Battle Plans to be a Trap instead of a Spell. Makes for an easy attack stopper. Other than that, holy crap this deck controls the game. 8/10.[/quote']TBH the only reason I didn't make Incorrect Battle Plans a trap was because I had no normal Spells! :P I'll probably make it a Quick-Play lol. No normal Spells for the Hackers. Link to comment
Toffee. Posted August 1, 2009 Report Share Posted August 1, 2009 Spellhacker's ATK should be 2000.Since the Opponent could activate Lightning Vortex from there hand, and end up screwing you up. And during your turn at that. Link to comment
Zkaiser Posted August 1, 2009 Author Report Share Posted August 1, 2009 That's the danger of hacking. You never know what your opponent will have to mess you up. Link to comment
Recommended Posts
Archived
This topic is now archived and is closed to further replies.