Natsuki Ada - Hacker Hunter
(feel free to change it as you like, i'm just writing some abilities ideas, won't focus on number of shots and stuff, will leave that up to you, use as many or as few of them as you want)
A young girl with very average physical stats, low when compared to other hunters. She is just strong enough to pass the Hunter Exam, but that's really not her strong suit. After developing and learning Nen, Ada finds out she is a conjurer and decides to apply all her knowledge about tech and hacking to conjure a very complex and powerfull mobile computer, her goggles. She can summon them any time she wants. These goggles give her the ability to scan other electronical devices and copy their data, making her work as a Hacker Hunter so much easier. Collecting information and searching for lost people are her specialties.
Passives
Zero-Day Exploit - At the start of the game, Ada gets informed of a
basic game census, showing the
divison of players among the factions.
Firewall - Ada keeps her security systems in high alert, and she is always aware of things or people that are targeting her. Every night,
Ada can choose to set a configuration for her firewall, either
getting a list of every player that visits her that night, or a
list of all effects aimed at her that night.
Encryption - Ada is always changing and deleting information about her from the network and is always on the move, this makes her really hard to find.
The first harmful ability targeting Ada during the night has to win a RPS battle to hit her. The following abilities, no matter if she won or lost the RPS, will hit her as normal. Upgraded abilities will go past this immunity.
Remote Attacks - Since Ada does her work and attacks remotely, not actually visiting her targets, she can never be seen by a tracker.
Actives
DoS Attack - Ada can target a player with a Denial-of-Service Attack and
roleblock them for that phase.
DDoS Attack - Ada can target a player with a Distributed Denial-of-Service Attack and
rolecrush them for that cycle. (2 shot)
Phishing - Ada creates a fake WU. The following phase, Ada gets a list of how many players from each faction liked that WU. (Not the names of the players, just a number of players per faction that liked that post). Only becomes elligible if more then 15 players like the post.( 1 shot) Non refillable.
Brute Force Attack - During the night Ada targets a player with a Brute Force Attack to access their data, investigating them and discovering their alignment. ( 3 shot)
Ransomware - Ada can target a player with a ransomware for a phase, she sends a message via the Host to the player, the target will then be given a choice to either inform their real alignment or get one of their remaining shots (randomly) destroyed.( 2 shot)
Spoofing - Ada creates another fake WU, this time, any player that quotes the WU won't be able to harm Ada for the next cycle.
Wincon: Eliminate all threats to town.