Search/Recent Changes
DBTropes
...it's like TV Tropes, but LINKED DATA!

Ghost Hacker (Video Game)

 Ghost Hacker (Video Game)
type
TVTItem
 Ghost Hacker (Video Game)
label
Ghost Hacker (Video Game)
 Ghost Hacker (Video Game)
page
GhostHacker
 Ghost Hacker (Video Game)
comment
Ghost Hacker is a Tower Defense Web Game where you play as a Digitized Hacker trying to take back cyberspace from rogue AIs. What makes it unique from other Tower Defense games is the "shape" that each tower occupies. Each tower has up to four "nodes" sticking from it, and the tower can only be placed on an area where both it and the nodes fit. These nodes are used for equipping upgrades on, which enhance the tower's capabilities.The first game focuses on the player character, Alpha, as they get accustomed to their new life as a Ghost — a digitized human who can act at the speeds of a computer. While hunting down rogue AIs at the behest of Cypher One, they come into contact and clash with the Ghost Collective and a rogue AI that calls himself "Axon".A sequel, Ghost Hacker 2, was released in 2013. This focuses on Jeth, a newly-converted Ghost looking to fix his friend Sil with the assistance of fellow hacker Spook. While clashing with Sigil, the corporation that has her captive, they uncover a virus that infects and controls Ghosts and must work to contain it.
 Ghost Hacker (Video Game)
fetched
2024-04-25T00:47:57Z
 Ghost Hacker (Video Game)
parsed
2024-04-25T00:47:57Z
 Ghost Hacker (Video Game)
processingComment
Dropped link to AngryBirds: Not a Feature - ITEM
 Ghost Hacker (Video Game)
processingComment
Dropped link to Batman: Not a Feature - ITEM
 Ghost Hacker (Video Game)
processingComment
Dropped link to CriticalHit: Not a Feature - ITEM
 Ghost Hacker (Video Game)
processingComment
Dropped link to FightClub: Not a Feature - ITEM
 Ghost Hacker (Video Game)
processingComment
Dropped link to Minecraft: Not a Feature - ITEM
 Ghost Hacker (Video Game)
processingComment
Dropped link to PacMan: Not a Feature - ITEM
 Ghost Hacker (Video Game)
processingComment
Dropped link to Portal2: Not a Feature - ITEM
 Ghost Hacker (Video Game)
processingComment
Dropped link to Portal: Not a Feature - ITEM
 Ghost Hacker (Video Game)
processingComment
Dropped link to SouthPark: Not a Feature - ITEM
 Ghost Hacker (Video Game)
processingComment
Dropped link to SuperMarioBros: Not a Feature - ITEM
 Ghost Hacker (Video Game)
processingComment
Dropped link to TheLegendOfZeldaOcarinaOfTime: Not a Feature - ITEM
 Ghost Hacker (Video Game)
processingComment
Dropped link to TheLordOfTheRings: Not a Feature - ITEM
 Ghost Hacker (Video Game)
processingComment
Dropped link to WallE: Not a Feature - ITEM
 Ghost Hacker (Video Game)
isPartOf
DBTropes
 Ghost Hacker (Video Game) / int_11ad560b
type
Control Freak
 Ghost Hacker (Video Game) / int_11ad560b
comment
Control Freak: Sigil developed the virus that drives Ghosts insane, allowing them to terminate the whole Ghost community should they lose control of too many Ghosts. Given that they are Cypher One under a different name, this behaviour is no surprise.
 Ghost Hacker (Video Game) / int_11ad560b
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_11ad560b
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_11ad560b
 Ghost Hacker (Video Game) / int_143fd94a
type
Starting Units
 Ghost Hacker (Video Game) / int_143fd94a
comment
Starting Units: In level 19, you start with a Tracer and Slicer, both towers that haven't been unlocked for construction yet. In level 21, you start with the special Transcoder tower, which is never buildable anywhere in the game. All of these pre-built towers differ from normal towers in that they can't be moved or sold.
 Ghost Hacker (Video Game) / int_143fd94a
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_143fd94a
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_143fd94a
 Ghost Hacker (Video Game) / int_1d364dbd
type
Heavily Armored Mook
 Ghost Hacker (Video Game) / int_1d364dbd
comment
Heavily Armored Mook: Two types: Reavers (which take 3 less damage from all attacks) and Avatars (which can only take at most 2 damage from all attacks). Attacks that are effective against one are nearly useless against the other.
 Ghost Hacker (Video Game) / int_1d364dbd
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_1d364dbd
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_1d364dbd
 Ghost Hacker (Video Game) / int_1e122f24
type
Boss Banter
 Ghost Hacker (Video Game) / int_1e122f24
comment
Boss Banter: Boss levels will have the rival Ghost taunt you at the start of each wave.
 Ghost Hacker (Video Game) / int_1e122f24
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_1e122f24
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_1e122f24
 Ghost Hacker (Video Game) / int_1f7b2d59
type
Law of Chromatic Superiority
 Ghost Hacker (Video Game) / int_1f7b2d59
comment
Law of Chromatic Superiority: All the Version 2.0 mooks have a red color palette and a red glow.
 Ghost Hacker (Video Game) / int_1f7b2d59
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_1f7b2d59
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_1f7b2d59
 Ghost Hacker (Video Game) / int_1fdc1aa
type
See the Invisible
 Ghost Hacker (Video Game) / int_1fdc1aa
comment
See the Invisible: The normally invisible Ghosts can only be attacked when in range of a Scanner.
 Ghost Hacker (Video Game) / int_1fdc1aa
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_1fdc1aa
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_1fdc1aa
 Ghost Hacker (Video Game) / int_21f3e32e
type
Chekhov's Boomerang
 Ghost Hacker (Video Game) / int_21f3e32e
comment
Chekhov's Boomerang: The game starts with Jeth looking to fix Sil from what turns out to be a virus. As the virus breaks out and becomes the main problem, Sil fades into the background... but then becomes a vital lead to tracking down the Final Boss.
 Ghost Hacker (Video Game) / int_21f3e32e
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_21f3e32e
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_21f3e32e
 Ghost Hacker (Video Game) / int_24fa70e3
type
Bandit Mook
 Ghost Hacker (Video Game) / int_24fa70e3
comment
Bandit Mook: Data Leeches can temporarily steal your resources to heal themselves. Destroy them to get your resources back (but not immediately — you'll need a Recycle program if you don't want it to slowly regenerate back).
 Ghost Hacker (Video Game) / int_24fa70e3
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_24fa70e3
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_24fa70e3
 Ghost Hacker (Video Game) / int_2be271c7
type
Hollywood Hacking
 Ghost Hacker (Video Game) / int_2be271c7
comment
Hollywood Hacking: The game is based on an Extreme Graphical Representation of the player defending themselves from foreign programs. Some levels reverse the roles with the player needing to break through the AI's own security. At one point in the second game the player hacks themselves to apply a cure for a virus.
 Ghost Hacker (Video Game) / int_2be271c7
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_2be271c7
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_2be271c7
 Ghost Hacker (Video Game) / int_2da1421
type
Booby Trap
 Ghost Hacker (Video Game) / int_2da1421
comment
Booby Trap: The Mine script places a mine on the path that deals damage to and stuns an enemy that steps on it.
 Ghost Hacker (Video Game) / int_2da1421
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_2da1421
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_2da1421
 Ghost Hacker (Video Game) / int_3121e8df
type
Split-Personality Merge
 Ghost Hacker (Video Game) / int_3121e8df
comment
Split-Personality Merge: Axon's erratic behaviour when the player first meets him is explained by him having merged with one of his defective copies. The boss level involved deleting the aggressive Axon so that the real Axon can speak clearly with the player.
 Ghost Hacker (Video Game) / int_3121e8df
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_3121e8df
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_3121e8df
 Ghost Hacker (Video Game) / int_33351187
type
Asteroids Monster
 Ghost Hacker (Video Game) / int_33351187
comment
Asteroids Monster: Splitters will split into smaller splitters when killed.
 Ghost Hacker (Video Game) / int_33351187
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_33351187
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_33351187
 Ghost Hacker (Video Game) / int_33fa230b
type
Your Princess Is in Another Castle!
 Ghost Hacker (Video Game) / int_33fa230b
comment
FireCastle.com quotes Your Princess Is in Another Castle! verbatim.
 Ghost Hacker (Video Game) / int_33fa230b
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_33fa230b
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_33fa230b
 Ghost Hacker (Video Game) / int_363e9631
type
Sequential Boss
 Ghost Hacker (Video Game) / int_363e9631
comment
Sequential Boss: Technically, each boss consists of five individual enemies (numbered 1.0 to 5.0), each of which spawns at the even-numbered waves in their levels.
 Ghost Hacker (Video Game) / int_363e9631
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_363e9631
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_363e9631
 Ghost Hacker (Video Game) / int_3700d6d8
type
Pinball Projectile
 Ghost Hacker (Video Game) / int_3700d6d8
comment
Pinball Projectile: The Linker upgrade makes attacks ricochet to another enemy.
 Ghost Hacker (Video Game) / int_3700d6d8
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_3700d6d8
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_3700d6d8
 Ghost Hacker (Video Game) / int_3bb81225
type
Recurring Boss
 Ghost Hacker (Video Game) / int_3bb81225
comment
Recurring Boss: Axon, the Final Boss of the first game, reappears as the first boss in the second game.
 Ghost Hacker (Video Game) / int_3bb81225
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_3bb81225
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_3bb81225
 Ghost Hacker (Video Game) / int_3c0a4666
type
Noodle Incident
 Ghost Hacker (Video Game) / int_3c0a4666
comment
Noodle Incident: Something happened between the two games that brought about the downfall of Cypher One. Nobody elaborates on what it is.
 Ghost Hacker (Video Game) / int_3c0a4666
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_3c0a4666
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_3c0a4666
 Ghost Hacker (Video Game) / int_3d585167
type
Damage-Increasing Debuff
 Ghost Hacker (Video Game) / int_3d585167
comment
Damage-Increasing Debuff: Scanners, towers with the Amplifier upgrade and the Focus script cause targets to take extra damage from attacks.
 Ghost Hacker (Video Game) / int_3d585167
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_3d585167
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_3d585167
 Ghost Hacker (Video Game) / int_40a533db
type
Guest-Star Party Member
 Ghost Hacker (Video Game) / int_40a533db
comment
Guest-Star Party Member: The Transcoder, a tower that combines the special abilities of the Tracer and Slicer and possesses 8 upgrade slots, is unbuildable and only appears at the start of level 21.
 Ghost Hacker (Video Game) / int_40a533db
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_40a533db
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_40a533db
 Ghost Hacker (Video Game) / int_40e2ac3f
type
Flunky Boss
 Ghost Hacker (Video Game) / int_40e2ac3f
comment
Flunky Boss: All the boss enemies in both games have the ability to spawn regular Mooks to divert your attention.
 Ghost Hacker (Video Game) / int_40e2ac3f
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_40e2ac3f
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_40e2ac3f
 Ghost Hacker (Video Game) / int_50345f8e
type
Multishot
 Ghost Hacker (Video Game) / int_50345f8e
comment
Multi Shot: Towers with the Fork upgrade attack two enemies at once.
 Ghost Hacker (Video Game) / int_50345f8e
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_50345f8e
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_50345f8e
 Ghost Hacker (Video Game) / int_52094ed
type
Team Killer
 Ghost Hacker (Video Game) / int_52094ed
comment
Team Killer: Reaper viruses will drain HP from other viruses in order to refill their own, and can even kill other viruses this way.
 Ghost Hacker (Video Game) / int_52094ed
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_52094ed
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_52094ed
 Ghost Hacker (Video Game) / int_52281b4e
type
Segmented Serpent
 Ghost Hacker (Video Game) / int_52281b4e
comment
Segmented Serpent: Centipede enemies have an energy chain attached to them or other Mooks. This allows them to share a pool of Hit Points.
 Ghost Hacker (Video Game) / int_52281b4e
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_52281b4e
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_52281b4e
 Ghost Hacker (Video Game) / int_539179db
type
Synchronization
 Ghost Hacker (Video Game) / int_539179db
comment
Synchronization: Centipedes form a chain with each other and other enemies, causing the damage taken by one to be distributed among the others.
 Ghost Hacker (Video Game) / int_539179db
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_539179db
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_539179db
 Ghost Hacker (Video Game) / int_53e6f4a
type
Diminishing Returns for Balance
 Ghost Hacker (Video Game) / int_53e6f4a
comment
Diminishing Returns for Balance: Placing additional copies of towers or upgrade parts now costs extra memory — 5 for duplicate upgrades, 10 for duplicate towers.
 Ghost Hacker (Video Game) / int_53e6f4a
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_53e6f4a
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_53e6f4a
 Ghost Hacker (Video Game) / int_589e54d3
type
Charged Attack
 Ghost Hacker (Video Game) / int_589e54d3
comment
Charged Attack: When idle, the Compressor can store up to a stock of 5 shots (upgradable to 10). The Charge upgrade allows a tower to store up to five shots per upgrade.
 Ghost Hacker (Video Game) / int_589e54d3
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_589e54d3
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_589e54d3
 Ghost Hacker (Video Game) / int_58bec5a6
type
Digitized Hacker
 Ghost Hacker (Video Game) / int_58bec5a6
comment
Digitized Hacker: Ghost Hackers are actually people who upload their mind onto the internet.
 Ghost Hacker (Video Game) / int_58bec5a6
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_58bec5a6
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_58bec5a6
 Ghost Hacker (Video Game) / int_58efc711
type
The Goomba
 Ghost Hacker (Video Game) / int_58efc711
comment
The Goomba: Bytes, which are slow, weak, and have no special abilities.
 Ghost Hacker (Video Game) / int_58efc711
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_58efc711
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_58efc711
 Ghost Hacker (Video Game) / int_5b1a2f4e
type
Ain't Too Proud to Beg
 Ghost Hacker (Video Game) / int_5b1a2f4e
comment
Ain't Too Proud to Beg: After his defeat, Jynx tries to distract the player by pointing out that Sigil intended to use the virus as a killswitch for the whole Ghost community, and offers to cooperate to stop this. Jeth has none of it and deletes him.
 Ghost Hacker (Video Game) / int_5b1a2f4e
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_5b1a2f4e
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_5b1a2f4e
 Ghost Hacker (Video Game) / int_617f0563
type
Heel–Face Turn
 Ghost Hacker (Video Game) / int_617f0563
comment
Heel–Face Turn: Axon, the Final Boss of the first game, becomes an ally after you beat him.
 Ghost Hacker (Video Game) / int_617f0563
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_617f0563
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_617f0563
 Ghost Hacker (Video Game) / int_64cf3b3f
type
Damage Reduction
 Ghost Hacker (Video Game) / int_64cf3b3f
comment
Damage Reduction: Reavers reduce all damage they take by 3.
 Ghost Hacker (Video Game) / int_64cf3b3f
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_64cf3b3f
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_64cf3b3f
 Ghost Hacker (Video Game) / int_66f763c0
type
Interface Screw
 Ghost Hacker (Video Game) / int_66f763c0
comment
Interface Screw: The ticker at the bottom of the level select screen starts with displaying bulletins or notifications. When the player gets infected with the virus, it turns into virus warnings. After Jynx broadcasts his mind-control virus cure, the ticker fills with Jynx propaganda. The level select screen will regularly distort while the player is infected with the virus.
 Ghost Hacker (Video Game) / int_66f763c0
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_66f763c0
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_66f763c0
 Ghost Hacker (Video Game) / int_6ec1f343
type
Mook Medic
 Ghost Hacker (Video Game) / int_6ec1f343
comment
Mook Medic: The aptly-named Medics, which constantly heals nearby enemies.
 Ghost Hacker (Video Game) / int_6ec1f343
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_6ec1f343
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_6ec1f343
 Ghost Hacker (Video Game) / int_726df893
type
Equipment Upgrade
 Ghost Hacker (Video Game) / int_726df893
comment
Equipment Upgrade: You now earn data cores for completing levels, with harder difficulties giving more data cores. These data cores can be spent to improve your towers, upgrade parts, scripts, or various passive perks. You can refund upgrades at no cost before entering a level to redistribute your upgrades for your current loadout.
 Ghost Hacker (Video Game) / int_726df893
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_726df893
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_726df893
 Ghost Hacker (Video Game) / int_72b8af59
type
Stealthy Mook
 Ghost Hacker (Video Game) / int_72b8af59
comment
Stealthy Mook: Ghosts are normally invisible and can only be detected when in range of a Scanner tower.
 Ghost Hacker (Video Game) / int_72b8af59
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_72b8af59
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_72b8af59
 Ghost Hacker (Video Game) / int_78255ad7
type
Passing the Torch
 Ghost Hacker (Video Game) / int_78255ad7
comment
Passing the Torch: After his defeat, Axon entrusts the player with the responsibility of protecting the Ghost community from Cypher One.
 Ghost Hacker (Video Game) / int_78255ad7
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_78255ad7
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_78255ad7
 Ghost Hacker (Video Game) / int_79a0e313
type
Bolivian Army Ending
 Ghost Hacker (Video Game) / int_79a0e313
comment
Bolivian Army Ending: The game ends with the player character being mobbed by several Cypher One Ghosts intending to delete him.
 Ghost Hacker (Video Game) / int_79a0e313
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_79a0e313
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_79a0e313
 Ghost Hacker (Video Game) / int_7a59a6d6
type
Mass Hypnosis
 Ghost Hacker (Video Game) / int_7a59a6d6
comment
Mass Hypnosis: After retrieving a cure for a virus, the player hands it to Jynx so that he can modify it to be broadcast and cure all infected Ghosts on the net. Jynx further modifies the "cure" to enact this trope, planning to have an army of Ghosts under his command.
 Ghost Hacker (Video Game) / int_7a59a6d6
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_7a59a6d6
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_7a59a6d6
 Ghost Hacker (Video Game) / int_7c0bfb83
type
Obviously Evil
 Ghost Hacker (Video Game) / int_7c0bfb83
comment
Obviously Evil: Jynx. Glowing red eyes and an evil smirk, and the fact that he made a Slayer virus that killed many Ghost Hackers pretty much gives it away.
 Ghost Hacker (Video Game) / int_7c0bfb83
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_7c0bfb83
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_7c0bfb83
 Ghost Hacker (Video Game) / int_84685817
type
Life Drain
 Ghost Hacker (Video Game) / int_84685817
comment
Life Drain: Reaper Viruses drain HP from other mooks to refill their own. You can take advantage of this.
 Ghost Hacker (Video Game) / int_84685817
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_84685817
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_84685817
 Ghost Hacker (Video Game) / int_863fa679
type
What Happened to the Mouse?
 Ghost Hacker (Video Game) / int_863fa679
comment
What Happened to the Mouse?: We never find out what happened to Sil, Axon, or Spook after the defeat of Jynx.
 Ghost Hacker (Video Game) / int_863fa679
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_863fa679
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_863fa679
 Ghost Hacker (Video Game) / int_88e5fcbc
type
One-Hit Polykill
 Ghost Hacker (Video Game) / int_88e5fcbc
comment
One-Hit Polykill: The Slicer, Transcoder and towers with the Beam upgrade fire a straight beam that deals damage to all foes on a straight line.
 Ghost Hacker (Video Game) / int_88e5fcbc
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_88e5fcbc
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_88e5fcbc
 Ghost Hacker (Video Game) / int_8a9eb844
type
Perspective Flip
 Ghost Hacker (Video Game) / int_8a9eb844
comment
Perspective Flip: The first game has unlockable "monster mode" levels where you field viruses to bypass defenses and steal data cores. The second game expands on this concept and turns it into levels where you're infiltrating security systems.
 Ghost Hacker (Video Game) / int_8a9eb844
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_8a9eb844
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_8a9eb844
 Ghost Hacker (Video Game) / int_90965cc7
type
Hive Mind
 Ghost Hacker (Video Game) / int_90965cc7
comment
Hive Mind: The Collective are a collection of Ghosts who speak as one to the player.
 Ghost Hacker (Video Game) / int_90965cc7
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_90965cc7
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_90965cc7
 Ghost Hacker (Video Game) / int_9183215d
type
Last Disc Magic
 Ghost Hacker (Video Game) / int_9183215d
comment
Last Disc Magic: The last program you receive on completing the penultimate level is always the Brute Force script, which temporarily buffs all your towers. The final level's hint always reads "When all else fails, use the Brute Force script".
 Ghost Hacker (Video Game) / int_9183215d
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_9183215d
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_9183215d
 Ghost Hacker (Video Game) / int_933576c8
type
Mighty Glacier
 Ghost Hacker (Video Game) / int_933576c8
comment
Mighty Glacier: The Sentry and Slicer are both slow-firing towers with very high individual damage per shot; the best way to overcome the Reavers' Damage Reduction, but nigh-useless against the Avatars which take a maximum of 2 damage per hit.
 Ghost Hacker (Video Game) / int_933576c8
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_933576c8
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_933576c8
 Ghost Hacker (Video Game) / int_957e5fc2
type
Villainous Breakdown
 Ghost Hacker (Video Game) / int_957e5fc2
comment
Villainous Breakdown: The Final Boss goes from mocking to furious as you hold out through the enemy waves of the final level.
 Ghost Hacker (Video Game) / int_957e5fc2
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_957e5fc2
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_957e5fc2
 Ghost Hacker (Video Game) / int_95f972d2
type
Nitro Boost
 Ghost Hacker (Video Game) / int_95f972d2
comment
Nitro Boost: Flamers gain a temporary 100% speed boost if they take any damage.
 Ghost Hacker (Video Game) / int_95f972d2
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_95f972d2
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_95f972d2
 Ghost Hacker (Video Game) / int_9d12bbc1
type
Foreshadowing
 Ghost Hacker (Video Game) / int_9d12bbc1
comment
Foreshadowing: The classified document the player discovers details the history of Alpha, but is partially censored. Astute readers can work out what it is before the twist is revealed at the end of the game.
 Ghost Hacker (Video Game) / int_9d12bbc1
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_9d12bbc1
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_9d12bbc1
 Ghost Hacker (Video Game) / int_9edbda07
type
Elite Mooks
 Ghost Hacker (Video Game) / int_9edbda07
comment
Elite Mooks: SuperUsers are resistant to Status Effects, can carry 2 data cores, and have the highest amount of health among non-boss enemies.
 Ghost Hacker (Video Game) / int_9edbda07
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_9edbda07
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_9edbda07
 Ghost Hacker (Video Game) / int_9f3857d5
type
Draw Aggro
 Ghost Hacker (Video Game) / int_9f3857d5
comment
Draw Aggro: Gravitons suck in all projectiles, so you'll need the Beam upgrade, Tracer, Slicer or Ping to hit other enemies.
 Ghost Hacker (Video Game) / int_9f3857d5
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_9f3857d5
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_9f3857d5
 Ghost Hacker (Video Game) / int_a5fb0d24
type
Healing Factor
 Ghost Hacker (Video Game) / int_a5fb0d24
comment
Healing Factor: Reassemblers regenerate 2 hit points per second (3 for the 2.0 version).
 Ghost Hacker (Video Game) / int_a5fb0d24
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_a5fb0d24
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_a5fb0d24
 Ghost Hacker (Video Game) / int_ac320c0e
type
Nuke 'em
 Ghost Hacker (Video Game) / int_ac320c0e
comment
Nuke 'em: In a bid to end Cypher One, Axon attempts to launch a nuclear missile at their headquarters. The Collective is opposed to that for it will also harm innocents.
 Ghost Hacker (Video Game) / int_ac320c0e
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_ac320c0e
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_ac320c0e
 Ghost Hacker (Video Game) / int_b1f18adb
type
Ray Gun
 Ghost Hacker (Video Game) / int_b1f18adb
comment
Ray Gun: The attack of the Tracer, Slicer, Transcoder and towers with the Beam upgrade take the form of a laser-like beam.
 Ghost Hacker (Video Game) / int_b1f18adb
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_b1f18adb
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_b1f18adb
 Ghost Hacker (Video Game) / int_b4d6aa7d
type
Dungeon Bypass
 Ghost Hacker (Video Game) / int_b4d6aa7d
comment
Dungeon Bypass: Seekers are able to pass over corrupted squares created by Corruptors. Pathfinders can do both of this, and will calculate the shortest path to a data core, corrupting and crossing squares on that path.
 Ghost Hacker (Video Game) / int_b4d6aa7d
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_b4d6aa7d
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_b4d6aa7d
 Ghost Hacker (Video Game) / int_be3e7584
type
Brutal Bonus Level
 Ghost Hacker (Video Game) / int_be3e7584
comment
Brutal Bonus Level: GhostClub.com, unlocked after you finish Champion difficulty on every level. 30 waves that include boss versions of the normal enemies, and the final wave contains multiple Axons AND Jynxes!
 Ghost Hacker (Video Game) / int_be3e7584
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_be3e7584
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_be3e7584
 Ghost Hacker (Video Game) / int_c3e4b9fd
type
Final-Exam Boss
 Ghost Hacker (Video Game) / int_c3e4b9fd
comment
Final-Exam Boss: The final boss of this game participates in many waves throughout the level, acting as a souped up version of the enemy type that you just fended off. He mimics almost every enemy you've faced thus far.
 Ghost Hacker (Video Game) / int_c3e4b9fd
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_c3e4b9fd
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_c3e4b9fd
 Ghost Hacker (Video Game) / int_c420a553
type
We Can Rule Together
 Ghost Hacker (Video Game) / int_c420a553
comment
We Can Rule Together: Jynx tries to pull this off near the end of the game, and after his defeat. It doesn't work, of course.
 Ghost Hacker (Video Game) / int_c420a553
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_c420a553
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_c420a553
 Ghost Hacker (Video Game) / int_c513249
type
Harder Than Hard
 Ghost Hacker (Video Game) / int_c513249
comment
Harder Than Hard: Beating the game unlocks the Challenge difficulty for every non-Monster level, which restricts the player to a predetermined program loadout for that level.
 Ghost Hacker (Video Game) / int_c513249
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_c513249
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_c513249
 Ghost Hacker (Video Game) / int_c75df49a
type
Shout-Out
 Ghost Hacker (Video Game) / int_c75df49a
comment
Shout-Out: Several of the optional level characters: Creepy, who had a vocal processor error that made him talk like a Creeper. BlockE, a program resembling WALL-E. WakkaMan, a green Pac-Man expy who only makes the sound Wakka. Witley, a Wheatley expy. Catman, an obvious Batman expy who is cat-themed instead. Chario and Bluigi, Mario and Luigi expies, the second of which loves to set others on fire, including his brother Chario. Kini, an unintelligible guy in an orange anorak who gets killed after you complete his level. Novi, a green fairy whose only dialogue is "Hey, Listen!". You shut off her vocal processors once you complete the stage. Various level descriptions also apply. AngryPigs.com advertises building tips to withstand bird attacks. One does not simply hack into Mordor.com. FireCastle.com quotes Your Princess Is in Another Castle! verbatim. The level description for GhostClub.com reads "The first rule of GhostClub is that you don't talk about GhostClub." Axon makes multiple references to cake during the level where the player fights him.
 Ghost Hacker (Video Game) / int_c75df49a
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_c75df49a
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_c75df49a
 Ghost Hacker (Video Game) / int_cadf2d2a
type
Death of a Thousand Cuts
 Ghost Hacker (Video Game) / int_cadf2d2a
comment
Death of a Thousand Cuts: The Tracer and Transcoder (which deal continuous damage to the target), the Infector and Memory Leak upgrade (which infects enemy, dealing damage per second), and to a lesser degree the fast-firing, low-damage towers like the Compressor and Scanner. They are the best way to deal with Avatars (which can only take at most 2 damage from any attack), but are very weak against Reavers (which take 3 less damage from all attacks).
 Ghost Hacker (Video Game) / int_cadf2d2a
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_cadf2d2a
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_cadf2d2a
 Ghost Hacker (Video Game) / int_d6f284a3
type
Anti-Frustration Features
 Ghost Hacker (Video Game) / int_d6f284a3
comment
Anti-Frustration Features: In the first game, before you place your towers, the upgrade nodes around them will regularly cycle through different color permutations which would determine what kinds of upgrades you can install onto them. The second game removes the color limitation so that the player can upgrade their towers on the fly with ease.
 Ghost Hacker (Video Game) / int_d6f284a3
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_d6f284a3
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_d6f284a3
 Ghost Hacker (Video Game) / int_d89e305a
type
Area of Effect
 Ghost Hacker (Video Game) / int_d89e305a
comment
Area of Effect: The Ping tower releases a circular blast that hits all enemies within. The projectiles fired by a Command Shell or any tower with the Splash upgrade deals splash damage to enemies around the initial target, all of which will take the same amount of damage.
 Ghost Hacker (Video Game) / int_d89e305a
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_d89e305a
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_d89e305a
 Ghost Hacker (Video Game) / int_db602541
type
Reflecting Laser
 Ghost Hacker (Video Game) / int_db602541
comment
Reflecting Laser: The Linker upgrade (which causes attacks to bounce to a secondary target) will become this if combined with towers with laser or beam attacks (which fire a straight beam).
 Ghost Hacker (Video Game) / int_db602541
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_db602541
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_db602541
 Ghost Hacker (Video Game) / int_dee6ef31
type
Enemy Summoner
 Ghost Hacker (Video Game) / int_dee6ef31
comment
Enemy Summoner: The Spawn and Decoy have the ability to spawn Baby Spawn and Decoy minions, which can carry a data core each. The Baby Spawn have an actual health bar but only spawn once per 10 seconds, while the mini-Decoys can be churned out much faster but die in one hit.
 Ghost Hacker (Video Game) / int_dee6ef31
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_dee6ef31
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_dee6ef31
 Ghost Hacker (Video Game) / int_e38268b5
type
Helpful Mook
 Ghost Hacker (Video Game) / int_e38268b5
comment
Helpful Mook: Reaper Viruses drain a huge chunk of life from nearby enemies to refill their own. Useful when they do it to a tough enemy, and it's essential for beating 2's Brutal Bonus Level.
 Ghost Hacker (Video Game) / int_e38268b5
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_e38268b5
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_e38268b5
 Ghost Hacker (Video Game) / int_e3f34fb4
type
Featureless Protagonist
 Ghost Hacker (Video Game) / int_e3f34fb4
comment
Featureless Protagonist: All that's known of the player character is through their dialogue.
 Ghost Hacker (Video Game) / int_e3f34fb4
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_e3f34fb4
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_e3f34fb4
 Ghost Hacker (Video Game) / int_e57bd3dd
type
Wolfpack Boss
 Ghost Hacker (Video Game) / int_e57bd3dd
comment
Wolfpack Boss: The final wave of the Brutal Bonus Level GhostClub.com involves fighting three Axons 5.0 and four Jynxes 5.0 (the final forms of the two bosses of the game), plus their minions.
 Ghost Hacker (Video Game) / int_e57bd3dd
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_e57bd3dd
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_e57bd3dd
 Ghost Hacker (Video Game) / int_e5d8460d
type
Unexplained Recovery
 Ghost Hacker (Video Game) / int_e5d8460d
comment
Unexplained Recovery: Axon is present in this game, despite his copies being mostly deleted by the conclusion of the previous game.
 Ghost Hacker (Video Game) / int_e5d8460d
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_e5d8460d
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_e5d8460d
 Ghost Hacker (Video Game) / int_e8ea58a4
type
Scratch Damage Enemy
 Ghost Hacker (Video Game) / int_e8ea58a4
comment
Scratch Damage Enemy: Avatars reduce all damage dealt to them to a maximum of 2. They're therefore highly resistant to Mighty Glacier towers but vulnerable to Death of a Thousand Cuts.
 Ghost Hacker (Video Game) / int_e8ea58a4
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_e8ea58a4
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_e8ea58a4
 Ghost Hacker (Video Game) / int_eb4086e3
type
Big Creepy-Crawlies
 Ghost Hacker (Video Game) / int_eb4086e3
comment
Big Creepy-Crawlies: Spiders and Bugs take the form of abnormally-sized arthropods.
 Ghost Hacker (Video Game) / int_eb4086e3
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_eb4086e3
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_eb4086e3
 Ghost Hacker (Video Game) / int_eb5cbe42
type
Me's a Crowd
 Ghost Hacker (Video Game) / int_eb5cbe42
comment
Me's a Crowd: Axon reveals that he has many copies of himself, and simply deleting one of his avatars will not stop him. Alpha is also an example — after Cypher One failed to create other Ghosts, they settled with making copies of Alpha, their only successful Ghost, with minor tweaks to personality to give the illusion of individuality.
 Ghost Hacker (Video Game) / int_eb5cbe42
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_eb5cbe42
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_eb5cbe42
 Ghost Hacker (Video Game) / int_f3cf30d9
type
Arbitrary Headcount Limit
 Ghost Hacker (Video Game) / int_f3cf30d9
comment
Arbitrary Headcount Limit: You start with the capacity to hold six programs, but you also unlock the ability to increase this capacity up to sixteen, be it through natural progression (in the first game) or by spending your data cores (second game). You'll reach a point where you have more programs than slots and must pick your loadout based on the enemy preview.
 Ghost Hacker (Video Game) / int_f3cf30d9
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_f3cf30d9
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_f3cf30d9
 Ghost Hacker (Video Game) / int_f6f2ff1
type
Insult Backfire
 Ghost Hacker (Video Game) / int_f6f2ff1
comment
Insult Backfire:
 Ghost Hacker (Video Game) / int_f6f2ff1
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_f6f2ff1
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_f6f2ff1
 Ghost Hacker (Video Game) / int_fc2f4def
type
Non-Indicative Difficulty
 Ghost Hacker (Video Game) / int_fc2f4def
comment
Non-Indicative Difficulty: Surprisingly, the Brutal Bonus Level is easier on Hard than on Medium, because it's harder to accidentally destroy the Reaper Viruses due to them having more hit points on Hard.
 Ghost Hacker (Video Game) / int_fc2f4def
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_fc2f4def
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_fc2f4def
 Ghost Hacker (Video Game) / int_fd4f8299
type
Well-Intentioned Extremist
 Ghost Hacker (Video Game) / int_fd4f8299
comment
Well-Intentioned Extremist: Axon opposes both the Collective and Cypher One, but only because he doesn't believe the Collective can protect the Ghost community from Cypher One's attacks.
 Ghost Hacker (Video Game) / int_fd4f8299
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_fd4f8299
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_fd4f8299
 Ghost Hacker (Video Game) / int_name
type
ItemName
 Ghost Hacker (Video Game) / int_name
comment
 Ghost Hacker (Video Game) / int_name
featureApplicability
1.0
 Ghost Hacker (Video Game) / int_name
featureConfidence
1.0
 Ghost Hacker (Video Game)
hasFeature
Ghost Hacker (Video Game) / int_name
 Ghost Hacker (Video Game) / int_name
itemName
Ghost Hacker (Video Game)

The following is a list of statements referring to the current page from other pages.

 Ghost Hacker (Video Game)
hasFeature
Damage-Increasing Debuff / int_d8c8cd0a
 Ghost Hacker (Video Game)
hasFeature
Heavily Armored Mook / int_d8c8cd0a
 Ghost Hacker (Video Game)
hasFeature
Invisible Monsters / int_d8c8cd0a
 Ghost Hacker (Video Game)
hasFeature
Kung Fu-Proof Mook / int_d8c8cd0a
 Ghost Hacker (Video Game)
hasFeature
Me's a Crowd / int_d8c8cd0a
 Ghost Hacker (Video Game)
hasFeature
Scratch Damage Enemy / int_d8c8cd0a