Guides

PvP Hacking Guide

How to hack other players, defend yourself, and wage digital warfare.

PvP Overview

In Stamp Collector Simulator, players can launch network attacks against each other. These attacks deliver malware, steal resources, or disrupt operations. PvP is a core part of the multiplayer experience.

How PvP Works

  1. Find a target — use Network Scan or Backtrace to discover other players
  2. Add them as a contact — scanned players become contacts you can target
  3. Cast a hack spell — play a Security or Data spell targeting a contact
  4. Network thread launches — the attack travels as a network thread to the victim
  5. Thread resolves — after duration, the attack effect is applied to the victim

Network Thread Duration

All PvP attacks take: baseDurationHours × 2 + 40 hours (scaled by world timescale). This gives victims time to detect and potentially respond to incoming attacks.

Offensive Spells

Security Tree (Primary Attack Tree)

Level 1 — Probing Attacks:

SpellEffectRequiresHack Level
Foreign ScriptSteals 500 money1 Basic Security Shard1
Targeted AttackDestroys 1 random software permanent2 Basic Security Shards1

Level 2 — Sustained Attacks:

SpellEffectRequiresHack Level
TrojanInjects net_trojan malware (10 HDD + 102 RAM drain)1 Core Security Shard2
System BreachCancels ALL running threads3 Core + 1 Basic Security Shard2

Level 3 — Devastating Attacks:

SpellEffectRequiresHack Level
Banking IntrusionSets target money to 02 Advanced + 1 Core Security Shard3
BIOS ExploitInjects net_bios_exploit (128 HDD + 68 RAM drain)1 Advanced Security Shard3
Buffer OverflowDestroys ALL non-malware software permanents3 Advanced Security Shards3

Data Tree (Utility & Intelligence)

SpellEffectRequires
Network ScanAdds top 10 stamp holders as contacts1 Core Data Shard
BacktraceIdentifies sources of incoming network threadsNone
Data HarvestSteals 1 random card from target’s HDD1 Advanced Data Shard + contact
Memory Leak ExploitInjects net_memory_leak (170 HDD + 510 RAM drain)1 Core Data Shard + contact
CounterhackMirrors incoming attacks back at attacker2 Advanced Data Shards

Defensive Strategies

Passive Defenses

Some permanents automatically protect against attacks:

  • Airgapped Architecture — completely blocks Targeted Attack
  • ICE (Intrusion Countermeasures Electronics) — sacrifices itself to block Targeted Attack
  • Magellan Protocol — sacrifices itself to block Targeted Attack

Active Defenses

  • Entropy Wipe — removes ALL malware permanents (requires 2 Basic Data Shards)
  • Backtrace — identifies who is attacking you so you can retaliate
  • Counterhack — mirrors incoming network threads back at the attacker (requires 2 Advanced Data Shards)

Strategic Defense

  • Diversify income — don’t put all your production into one thread type that System Breach can wipe
  • Keep spare resources — a buffer of money protects against Foreign Script and Banking Intrusion
  • Check for malware regularly — malware drains capacity silently
  • Favor From Above — grants adversary immunity until the adversary is killed or sleeps (not PvP attacks)

Hack Levels and Adversary Damage

Hack spells also damage adversaries when targeted at them:

  • Level 1 — 1 HP damage
  • Level 2 — 4 HP damage (level²)
  • Level 3 — 9 HP damage (level²)

This dual-use makes Security tree investment valuable for both PvP and PvE.

Tips

  • Scout first — Network Scan costs resources. Only attack targets worth hitting
  • System Breach is king — canceling all threads is devastating; it stops income and wastes the victim’s resources
  • Stack malware — multiple Trojans and BIOS Exploits compound the drain
  • Retaliate quickly — use Backtrace to find attackers, then hit back hard
  • Don’t neglect defense — Entropy Wipe should always be in your toolkit