# Codebreaker

<figure><img src="https://1336820535-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MkYiojyrkfYa6oJhxF5%2Fuploads%2FnqHFZe9Ws5jopWTUatr8%2Fcodebreaker.png?alt=media&#x26;token=592db20c-8d26-4723-a8d0-18d4915af807" alt=""><figcaption></figcaption></figure>

### **AVAILABLE CARDS**

*<mark style="color:red;">\*NOTE:</mark>* The playing cards are constantly being updated, the information that appears in the game may not correspond to this guide.

<div><figure><img src="https://1336820535-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MkYiojyrkfYa6oJhxF5%2Fuploads%2FzBwlcYMvyyAtNTBpZkgA%2Fbeta-beam.png?alt=media&#x26;token=37ff9e63-e102-4bf0-9512-b86b67cbb03c" alt=""><figcaption></figcaption></figure> <figure><img src="https://1336820535-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MkYiojyrkfYa6oJhxF5%2Fuploads%2FEinSl3myMvMfPNH7ntPT%2Fcrippling-beam.png?alt=media&#x26;token=93dedd2b-fa80-4fef-afd4-0fba0dcd552b" alt=""><figcaption></figcaption></figure> <figure><img src="https://1336820535-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MkYiojyrkfYa6oJhxF5%2Fuploads%2FOWALkD0LXQOTHCvHxBAC%2Fcyber-infection.png?alt=media&#x26;token=54110c3d-3b4e-4f98-b7d4-7b403142e1fd" alt=""><figcaption></figcaption></figure></div>

<div><figure><img src="https://1336820535-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MkYiojyrkfYa6oJhxF5%2Fuploads%2FY7U9Eub5ReEQpOfnbFs2%2Fdischarge.png?alt=media&#x26;token=a01624de-3fb9-4291-8ab8-73a75aea8326" alt=""><figcaption></figcaption></figure> <figure><img src="https://1336820535-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MkYiojyrkfYa6oJhxF5%2Fuploads%2FAdmwV69mtQjIHhuqAnN4%2Fenergy-overload.png?alt=media&#x26;token=9c687a48-11f3-4d43-a99f-f04f2d465f0f" alt=""><figcaption></figcaption></figure> <figure><img src="https://1336820535-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MkYiojyrkfYa6oJhxF5%2Fuploads%2Fa8rHHTnNoj5tP4QXGfah%2Fgravity-well.png?alt=media&#x26;token=af25becb-893d-48d1-b056-96c1a8ffd9f6" alt=""><figcaption></figcaption></figure></div>

<div><figure><img src="https://1336820535-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MkYiojyrkfYa6oJhxF5%2Fuploads%2FwCf94sMOh9zTMa8rIKcg%2Fhacker-protocol.png?alt=media&#x26;token=fdf264c6-c9aa-4766-abc1-d3b6577c15b1" alt=""><figcaption></figcaption></figure> <figure><img src="https://1336820535-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MkYiojyrkfYa6oJhxF5%2Fuploads%2FU9aS4yZV9ZaNgPghCpwz%2Fharmful-frequency.png?alt=media&#x26;token=8710042e-9ae7-4cc1-8aeb-0566d72a2ba6" alt=""><figcaption></figcaption></figure> <figure><img src="https://1336820535-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MkYiojyrkfYa6oJhxF5%2Fuploads%2FyRGuove9j4rPJdi5uCPO%2Freflect.png?alt=media&#x26;token=963d20a9-0aea-42b5-b63f-0c7342ce131c" alt=""><figcaption></figcaption></figure></div>

<div><figure><img src="https://1336820535-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MkYiojyrkfYa6oJhxF5%2Fuploads%2FhQdx35jlrJAHI8Q9eZkv%2Fshort-circuit.png?alt=media&#x26;token=32c5d3d7-743d-4cb6-b3da-c6aff6c30ac4" alt=""><figcaption></figcaption></figure> <figure><img src="https://1336820535-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MkYiojyrkfYa6oJhxF5%2Fuploads%2FUqyL1TigCnMPVo7UYl2R%2Fspreading-fire.png?alt=media&#x26;token=4a2a8e2e-78d6-44b5-a650-d8303e03ebdd" alt=""><figcaption></figcaption></figure> <figure><img src="https://1336820535-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MkYiojyrkfYa6oJhxF5%2Fuploads%2FFAcfCp3AkyWBp7Oc2ilc%2Fstock-up.png?alt=media&#x26;token=f15c1187-1e3e-4795-a8c9-7acc9f32953a" alt=""><figcaption></figcaption></figure></div>

<table data-view="cards"><thead><tr><th>Card</th><th>Part</th><th>Type</th><th>Effect</th><th>Distance</th><th>Target</th><th>Energy cost</th></tr></thead><tbody><tr><td><strong>Beta beam</strong></td><td>Helmet</td><td>Attack</td><td>700 DMG</td><td>1</td><td>Single enemy</td><td>20</td></tr><tr><td><strong>Crippling beam</strong></td><td>Frontek</td><td>Utility/Attack</td><td>300 DMG and 25% disable for 1 turn</td><td>2</td><td>Single enemy</td><td>15</td></tr><tr><td><strong>Cyber-infection</strong></td><td>Left gear</td><td>Attack</td><td>Infection (300 DMG) for 2 turns</td><td>2</td><td>Single enemy</td><td>10</td></tr><tr><td><strong>Discharge</strong></td><td>Left gear</td><td>Utility</td><td>Energy -30</td><td>-</td><td>Single enemy</td><td>15</td></tr><tr><td><strong>Energy overload</strong></td><td>Kinetics</td><td>Utility</td><td>Energy +50</td><td>-</td><td>Personal</td><td>15</td></tr><tr><td><strong>Gravity well</strong></td><td>Right gear</td><td>Attack</td><td>600 DMG</td><td>2</td><td>Single enemy</td><td>25</td></tr><tr><td><strong>Hacker protocol</strong></td><td>Cortex</td><td>Utility/Attack</td><td>300 DMG and suppress attack for 1 turn</td><td>2</td><td>Single enemy</td><td>15</td></tr><tr><td><strong>Harmful frequency</strong></td><td>Cortex</td><td>Attack</td><td>400 DMG</td><td>2</td><td>Single enemy</td><td>15</td></tr><tr><td><strong>Reflect</strong></td><td>Right gear</td><td>Utility</td><td>Reflect for 2 turns</td><td>-</td><td>Personal</td><td>30</td></tr><tr><td><strong>Short-circuit</strong></td><td>Frontek</td><td>Utility</td><td>Stun for 1 turn</td><td>3</td><td>Single enemy</td><td>15</td></tr><tr><td><strong>Spreading fire</strong></td><td>Kinetics</td><td>Attack</td><td>Burn (200 DMG) for 3 turns</td><td>-</td><td>Enemy area</td><td>15</td></tr><tr><td><strong>Stock up</strong></td><td>Helmet</td><td>Utility</td><td>Draw 4 cards</td><td>-</td><td>Personal</td><td>20</td></tr></tbody></table>
