Guides
PvP Hacking Guide
How to hack other players, defend yourself, and wage digital warfare.
PvP Overview
In Stamp Collector Simulator, players can launch network attacks against each other. These attacks deliver malware, steal resources, or disrupt operations. PvP is a core part of the multiplayer experience.
How PvP Works
- Find a target — use Network Scan or Backtrace to discover other players
- Add them as a contact — scanned players become contacts you can target
- Cast a hack spell — play a Security or Data spell targeting a contact
- Network thread launches — the attack travels as a network thread to the victim
- Thread resolves — after duration, the attack effect is applied to the victim
Network Thread Duration
All PvP attacks take: baseDurationHours × 2 + 40 hours (scaled by world timescale). This gives victims time to detect and potentially respond to incoming attacks.
Offensive Spells
Security Tree (Primary Attack Tree)
Level 1 — Probing Attacks:
| Spell | Effect | Requires | Hack Level |
|---|---|---|---|
| Foreign Script | Steals 500 money | 1 Basic Security Shard | 1 |
| Targeted Attack | Destroys 1 random software permanent | 2 Basic Security Shards | 1 |
Level 2 — Sustained Attacks:
| Spell | Effect | Requires | Hack Level |
|---|---|---|---|
| Trojan | Injects net_trojan malware (10 HDD + 102 RAM drain) | 1 Core Security Shard | 2 |
| System Breach | Cancels ALL running threads | 3 Core + 1 Basic Security Shard | 2 |
Level 3 — Devastating Attacks:
| Spell | Effect | Requires | Hack Level |
|---|---|---|---|
| Banking Intrusion | Sets target money to 0 | 2 Advanced + 1 Core Security Shard | 3 |
| BIOS Exploit | Injects net_bios_exploit (128 HDD + 68 RAM drain) | 1 Advanced Security Shard | 3 |
| Buffer Overflow | Destroys ALL non-malware software permanents | 3 Advanced Security Shards | 3 |
Data Tree (Utility & Intelligence)
| Spell | Effect | Requires |
|---|---|---|
| Network Scan | Adds top 10 stamp holders as contacts | 1 Core Data Shard |
| Backtrace | Identifies sources of incoming network threads | None |
| Data Harvest | Steals 1 random card from target’s HDD | 1 Advanced Data Shard + contact |
| Memory Leak Exploit | Injects net_memory_leak (170 HDD + 510 RAM drain) | 1 Core Data Shard + contact |
| Counterhack | Mirrors incoming attacks back at attacker | 2 Advanced Data Shards |
Defensive Strategies
Passive Defenses
Some permanents automatically protect against attacks:
- Airgapped Architecture — completely blocks Targeted Attack
- ICE (Intrusion Countermeasures Electronics) — sacrifices itself to block Targeted Attack
- Magellan Protocol — sacrifices itself to block Targeted Attack
Active Defenses
- Entropy Wipe — removes ALL malware permanents (requires 2 Basic Data Shards)
- Backtrace — identifies who is attacking you so you can retaliate
- Counterhack — mirrors incoming network threads back at the attacker (requires 2 Advanced Data Shards)
Strategic Defense
- Diversify income — don’t put all your production into one thread type that System Breach can wipe
- Keep spare resources — a buffer of money protects against Foreign Script and Banking Intrusion
- Check for malware regularly — malware drains capacity silently
- Favor From Above — grants adversary immunity until the adversary is killed or sleeps (not PvP attacks)
Hack Levels and Adversary Damage
Hack spells also damage adversaries when targeted at them:
- Level 1 — 1 HP damage
- Level 2 — 4 HP damage (level²)
- Level 3 — 9 HP damage (level²)
This dual-use makes Security tree investment valuable for both PvP and PvE.
Tips
- Scout first — Network Scan costs resources. Only attack targets worth hitting
- System Breach is king — canceling all threads is devastating; it stops income and wastes the victim’s resources
- Stack malware — multiple Trojans and BIOS Exploits compound the drain
- Retaliate quickly — use Backtrace to find attackers, then hit back hard
- Don’t neglect defense — Entropy Wipe should always be in your toolkit