:Otherscape Action Database

by City of Mist

City of Mist

$29.95 
Availability: 397 in stock

 

Tags: :Otherverse Shopify Collective

:Otherscape Action Database

*** Next day dispatch for US and UK. Shipping early January 2025 for EU and Canada.

Instantly download a PDF copy of this item after checkout, guarantee your print copy, and save $$$!

Suggestions for actions in the Mythic Cyberpunk RPG.

The Action Database is a 108-page supplement for the :Otherscape RPG.

With its open-ended tag-based rules, :Otherscape allows you to simulate and resolve any imaginable action that players could want to take in a scene. From hacking a simple lock to piloting drones, from brewing potions to summoning spirits, from driving a getaway car to shooting rockets at a giant spider tank – all actions of a mythic cyberpunk series can be resolved using the same rules and with a single roll, making way for the story you want to tell.

The Action Database is a supplement to the core rules of :Othrescape, offering an encyclopedic collection of suggestions for typical player actions and how the game’s
rolls and Effects can be used to resolve them. It can be used by players and MCs alike for inspiration for actions and Consequences, or as a quick reference on how to resolve specific actions and situations during the game.

Among the action categories covered in this book:

  • Combat actions, including attacks, tactical actions, support actions, and different types of defense.
  • Cyberspace actions including data manipulation, hacking, virtual reality shaping, and harnessing.
  • Exploration & survival actions, including navigating terrain and hazards, scouting, sneaking, as well as treating injury and recovery.
  • Mythos powers actions including working with Sources, spellcasting, summoning, transformation, communing with Mythoi, and many other types of magic.
  • Social interaction actions including deception, persuasion, managing reputation, leadership, and manipulation, as well as a range of business transactions.
  • Spycraft actions such as surveilling, shadowing, sneaking, and gathering information.
  • Tech & gear actions including building, upgrading, and repairing tech, operating devices, vehicles, and drones, and tampering with tech.