magicandcuriosity
magicandcuriosity
Learn, to Adapt, to Survive
239 posts
Don't wanna be here? Send us removal request.
magicandcuriosity · 9 days ago
Text
Special Lesson: Sequencer.exe - Do or Die
"...Vap0r and I utilize special programs when we do certain hacking jobs. These programs are called Sequencers, and they allow us to connect to nodes thought to be impenetrable. However, something like this does have its drawbacks..."
"First and foremost, Sequencers need a control file. Getting it might be easy, or it might be hard. However, a control file is necessary for the Sequencer to function. That's what tells it where to connect to."
"Second, there aren't many operating systems out there that can handle running a Sequencer. KeySmith's one of those select few. The exclusivity sucks, but it's just how they're built."
"Third... Sequencers can't hold a connection forever. You only have a limited amount of time to do what you need to do and get out. If the Sequencer fails, then it will leave enough evidence to be traced back to you. So don't let it fail. If not for your computer's sake, then for your own."
"Of course, some of you may be wondering why Sequencers are called... well, Sequencers. Truth is that they're actually jerryrigged music sequencers - fitted to our purpose. Although the Sequencer still does its originally intended job - nothing like some high-energy music to pump you up for a race against time."
"And with that, I think I've taught you everything I can - the rest is up to you. You shouldn't aim to be the best hacker there is - keep your goals small for now. Keep knocking contracts down, and you'll eventually make a name for yourself."
Tumblr media
"Don't aim for the stars - eclipse the sun."
1 note · View note
magicandcuriosity · 9 days ago
Text
Hacking 301: Other Tools of the Trade
"Hacking isn't always about cracking ports, you know. There's ways to be more efficient, and to find out more information - if you can learn a password from somewhere else, that's less time you have to spend actually hacking - and risking a trace. That being said, let me tell you about some of the most valuable tools in any hacker's arsenal."
Notes.exe
"What is there to say about this one, really? Pen and paper is nice, but sometimes you need your information right where you're already looking. The Notes program utilizes your RAM display in order to display your notes right alongside your other important things. But if you want to save on valuable RAM space..."
DNotes.exe (DumpNotes)
"...DNotes is the way to go. Quick and simple, DNotes simply does as the name implies - it dumps the contents of your notes file into the terminal and then immediately quits. It has no editing capability, but it doesn't really need it - if you've got time to edit, you've got time to use the regular Notes program."
eosDeviceScan.exe
"Phones, tablets, other devices... there are quite a few that run off of eOS. This program works by emulating a sync request in order to discover the IP addresses of any eOS devices connected to the node you're scanning. Of course, you need admin access in order to do that, but it's a small price to pay. And remember - if the eOS device isn't jailbroken, the admin password is always 'alpine'."
The DEC Suite (DECHead.exe and Decypher.exe)
"DEC encryption is commonplace, so you'll want tools that can help you with DEC-encrypted files. DECHead does as the name implies - it can read the header information of DEC-encrypted files. Header information tends to include IPs, which might trace back to where the file was encrypted at. But if you want a peek at what's inside, Decypher can get you in - just remember you'll need a password for some files. But enough digging can turn up anything..."
The Shell Suite (OPShell.exe and ComShell.exe)
"Shells are important, both for dealing with proxies and keeping yourself safe. If you find yourself opening shells on the same few nodes a lot, OPShell can help you out - you can use it to save a list of shell sources and then on later use it can automatically open up shells on those nodes. ComShell, on the other hand, is all about proxy-breaking... it allows you to trigger all of your active shells' overload functions simultaneously, and even close them all if you need the extra RAM space."
The Mem Suite (MemDumpGenerator.exe and MemForensics.exe)
"What happens when you delete a file from your computer? It's gone, right? Except it's not *truly* gone - it remains in memory for a time. MemDumpGenerator can bring that hidden data out - if it senses something of interest in a given node's memory, it'll create a memory dump. Of course, it's useless if you can't read it... but that's what MemForensics is for. Using MemForensics, you can take a look at command logs, files, and even images stored in memory. Dig up clues that others thought they trashed and buried."
"...there's one more tool that I want to talk about, but that will get its own separate bit. You've already got more than enough info right now - these tools will make your hacking jobs a lot easier, believe me."
1 note · View note
magicandcuriosity · 9 days ago
Text
Hacking 202: Emergency Trace Aversion Sequence (ETAS)
"All right, listen up - this information can easily save you a lot of headache. Naturally you know about KeySmith and what it's capable of. However, it has one emergency function that I haven't talked much about yet - a last-ditch effort to keep you safe."
"If KeySmith detects a completed trace, it will automatically enter a failsafe mode that functions as a 'shield' of sorts - the Emergency Trace Aversion Sequence, or ETAS for short. This silver bullet will automatically absorb all incoming pings so they can't return to whatever node is sending them - to the tracer, it'll look like a connection error."
"However, everything can be worked around - even something like this. That's why KeySmith automatically traces back your IP to the internet service provider that issued it and gives you their system IP. Connect to it, hack it, and use their administrative tools to reset your IP - that'll temporarily disconnect you from the internet and completely avert the trace. But if you can't do that before the tracer circumvents KeySmith's defenses... well, your computer's as good as gone."
"Hopefully none of you will actually need to use the ETAS... but who knows? It could very well save your ass someday. I'm also thinking about reverse-engineering the ETAS protocol to put into other systems as well - an extra layer of security never hurts."
1 note · View note
magicandcuriosity · 9 days ago
Text
Hacking 201: Counter-Hacks, Traces and Other Threats
"So you remember what I talked about earlier, right? Hacking nodes might seem like a walk in the park, but believe me, it's not always that easy. You'll have to deal with security systems from anybody who's not a newbie or a complete idiot, so let me break things down for you."
Proxies
"Proxies are a common form of defense when it comes to hacking. Most port crackers aren't able to function if there's a proxy active. Surprisingly, MasterKey is able to bypass active proxies, but that's not something that's pertinent to you guys. So when you see a proxy, what do you do?"
Shells Part 1: Overloading
"If you have administrative access on a node, you can set up a shell there. Shells have two functions, but I'll only talk about one of them for now... shells can be used to send in requests to a proxy, bombarding it with traffic. If enough traffic comes in, the proxy will overload and won't be able to block incoming connections. The more shells you use in your attack, the faster the proxy will overload."
Firewalls
"Firewalls are a bit of a different beast - they won't do anything to stop your port crackers, but they'll completely stymie your attempts at brute-force attacks. In order to crack that admin password, you need to get the firewall out of the way. You can analyze a firewall in order to figure out its passphrase - each analysis pass will remove more and more garbage data from the structure, making it easier and easier to figure out the passphrase. But just be aware that each analysis pass takes more and more time - work quickly with the information you have!"
Traces
"KeySmith comes equipped with automatic trace detection. If you hear a beep when you start hacking and see a timer in the lower-left corner of your monitor, you're being traced. You need to disconnect before that timer hits zero, or... well, do I even have to say anything more? Good news, though - there are some ways to deal with a trace."
TraceKill
"TraceKill is a no-brainer if you're going up against nodes with a proxy or firewall - or both. It takes up a lot of your precious RAM, but it fully suppresses active traces as long as it's running. You can squeeze in four shells and still have room to run TraceKill, so keep that in mind - use the time you're given to overload proxies and solve firewalls. Just be ready to move as soon as you close that process..."
SignalScramble
"If you're confident in your abilities to get into nodes before a trace completes, then SignalScramble will be your best friend. It requires administrator access in order to function, but once you do, it'll suppress active traces - allowing you to do what you need to do. It can even function at reduced efficiency if you're low on RAM - it spins up when you launch it, and it won't take any more RAM than what you've got free. Be efficient and launch SignalScramble while you're brute-forcing the admin password so it'll be ready to go as soon as you're in."
Counter-Hacks
"Clean your logs. Clean your logs. CLEAN YOUR LOGS. The number one way you're getting counter-hacked is if you haven't cleaned your logs before disconnecting from a node. Remember these commands well:"
cd log rm * ForkBomb
"That way, you leave absolutely no trace of your IP. Simply disconnecting from a node after clearing the log folder can be enough, but if someone sees your disconnect log and traces back your IP, they'll be able to do some nasty stuff. But that's where shells come in."
Shells Part 2: Shell Trap
"Shells have a second function that's best used on your home node - click the 'Trap' button and you'll arm a Shell Trap. If you're alerted of any incoming foreign connections, SLAM THAT 'TRIGGER' BUTTON PRONTO. Your computer will crash... but so will theirs. That's usually enough deterrent for most. Of course, if they get in, then you might have to deal with a ForkBomb yourself."
ForkBomb
"A ForkBomb is nasty - it'll quickly fill up your RAM with garbage data, and if your RAM overflows it'll cause a bluescreen. Luckily, the ForkBomb function can be killed - you just have to be quick. List your processes, find the ForkBomb and kill it to stop your RAM from overflowing."
"That should cover everything when it comes to traces and other attacks. Remember to always back up your system files to a node that only you know about - that way, you can perform a system recovery if, say, your x-server gets wiped. While some hackers are able to function with nothing but their terminal... let's just say it's not something you want to get used to."
1 note · View note
magicandcuriosity · 9 days ago
Text
Hacking 101: Port Crackers and How to Use Them
"As new agents of Entropy/CSEC, you might be a bit unfamiliar with all of the different ports that nodes tend to have. That's why I'm here - I can help educate you on the most common nodes, as well as ways to open them to facilitate brute-force password attacks. Listen up, because this is going to be a lot to cover."
SSH (Secure Shell protocol)
Port Cracker: SSHCrack
Usual port number: 22
"The Secure Shell protocol. Mainly used for remote login and command-line execution. SSHCrack works fairly quickly and isn't too RAM-intensive."
FTP (File Transfer Protocol)
Port Crackers: FTPBounce, FTPSprint
Usual port number: 21
"Ah, good old file transfer. This one's got two different port crackers, but one's a clear upgrade over the other. FTPBounce uses about as much RAM as SSHCrack does, but it's abhorrently slow. FTPSprint uses a bit less RAM and is way faster - if you run SSHCrack and FTPSprint at around the same time, they'll finish within half a second of each other. Useful for multitasking."
SMTP (Simple Mail Transfer Protocol)
Port Cracker: SMTPOverflow
Usual port number: 25
"Mail services... obviously, e-mail servers have this port. Other computers can have it too, though. SMTPOverflow works slowly and is a bit of a RAM hog, but you take what you can get."
HTTP Webserver
Port Cracker: WebServerWorm
Usual port number: 80
"Port 80 transfers data between web servers and clients. WebServerWorm takes a while to inject itself, but it's got a relatively small RAM footprint so you can run other port crackers while it's doing its thing."
SQL (database communication)
Port Cracker: SQL_MemCorrupt
Usual port number: 1433
Special note: SQL_MemCorrupt bypasses active proxies
"Databases of all kinds use this port. SQL_MemCorrupt is one of those RAM-intensive port crackers and it takes a while to work, but at least it doesn't clog up everything while it does it."
DICOM (Digital Imaging and Communications in Medicine)
Port Cracker: KBTPortTest
Usual port number: 104
Special note: KBTPortTest doesn't trigger traces
"OK, this one isn't used as often, but I'm still going to mention it. Since this particular port cracker is used to stress-test medical communications, it won't trip any security systems if used. Of course, it can't bypass proxies, so be mindful of that."
BitTorrent
Port Cracker: TorrentStreamInjector
Usual port number: 6881
Special note: TorrentStreamInjector bypasses active proxies
"Oh god... whoever designed this port cracker had no idea what they were doing. Sure, it works quickly for its RAM footprint, but it keeps flooding the port with data long after it's already open. Do yourself a favor and just kill its process as soon as it's done what you need it to do."
SSL (Secure Sockets Layer)
Port Cracker: SSLTrojan
Usual port number: 443
Special notes: Requires an open SSH, FTP, HTTP or RTSP (see below) port to function; bypasses active proxies
"This one's a little bit confusing for first-timers, so here's a quick rundown. SSLTrojan effectively 'tunnels through' a different port in order to force open the SSL port. As such, you need a compatible port to be open in order to use it. Don't get caught with your pants down - usually FTP is the quickest one to open, so FTPSprint that sucker and have SSLTrojan go at it while you work on other ports."
Pacific Dedicated
Port Cracker: PacificPortCrusher
Usual port number: 192
"...I'm only mentioning this because it is a port cracker, and it can be used to hack nodes that have this particular port. I won't say anything more about it."
RTSP (Real-Time Streaming Protocol)
Port Cracker: RTSPCrack
Usual port number: 554
Special note: RTSPCrack bypasses active proxies
"This port cracker is a unique one - it stays open after it opens the port like TorrentStreamInjector does, but it actively reduces its RAM footprint when that happens. It's still advisable to kill its process, but if you can fit in another port cracker with the extra RAM, then you can be efficient - and efficiency is key."
"...and that should about cover it. Don't worry if you didn't manage to catch all that - basic targets tend to have SSH, FTP and HTTP ports. If you remember nothing else for now, remember those three. But hacking isn't always go-at-your-own-pace... next up, I'll talk about security systems and other forms of attack you might have to deal with."
1 note · View note
magicandcuriosity · 14 days ago
Text
Tumblr media
"It's no idle boast to say that not even CSEC's best would be able to find any trace of Database. He's already gone before any trace software even knows he showed up."
2 notes · View notes
magicandcuriosity · 20 days ago
Text
[Coel] I am a raft floating on an ocean of pure shame
Levi Fischer ('Coel') is now a muse on this blog!
This muse takes heavy inspiration from the game Hacknet, so if you haven’t heard of it, give it a look-see!
Levi is an expert in the field of cyber security, and a prominent member of CSEC. Because of her skillset, she was recruited into Bibliotheque by 'Kaguya'. She thought that she was using her skills to help make the world a better place.
And then something happened that would completely shatter her viewpoint of that group...
After the incident and subsequent disbanding of Bibliotheque, Levi went back to CSEC and is continuing to do contracts there - although she'll never forget what happened that day...
2 notes · View notes
magicandcuriosity · 20 days ago
Text
Cute. Well, you're much better than I thought! I'm genuinely surprised. ...I wish sarcasm conveyed better through text format. Also, don't fuck anything up. I like this proxy.
--
OK, OK, I get it. Fair enough. Stop messing with my shit.
Mavis Lancer ('Naix') is now a muse on this blog!
This muse takes heavy inspiration from the game Hacknet, so if you haven’t heard of it, give it a look-see!
Mavis is a prominent member of the 5chan hacking group known as lelzSec (/el), and is also one of the CCC Hacksquad. He doesn't take too kindly to people invading his network - even less so when they mess with his computers.
Although he's started to mellow out a bit recently, he's still a hellion and should be approached with caution.
2 notes · View notes
magicandcuriosity · 21 days ago
Text
Hi. My name is Bit, and if you're hearing this, I'm already dead. It also means SkeletonKey's stopped, and my scripts worked. Which means we're finished. Which means you've done it. Doing this now was our last chance, I think. While they're in a rush to finish it all, and not under the eyes of the whole world yet... So... thanks. Thanks.
If all's gone right, there's only one copy of KeySmith left to delete... ...and you're looking at it.
Samuel Bose ('Bit') is now a muse on this blog!
This muse takes heavy inspiration from the game Hacknet, so if you haven't heard of it, give it a look-see!
In an alternate telling of Hacknet's story, Samuel's consciousness was backed up to the Metaverse after his 'death'. There he hid and bided his time, hoping that someone would be able to expose the treachery going on at SecuriTech...
...and eventually, somebody did.
After being given a new body and finally returning to the physical world, 'Bit' has settled right back in doing contracts for CSEC as their second-best hacker.
Who's the best? Well, they're an old friend of his...
1 note · View note
magicandcuriosity · 24 days ago
Photo
Tumblr media
189K notes · View notes
magicandcuriosity · 1 month ago
Text
"Nothing wrong with bagels. I'd say they're a good substitute for the souls of the innocent."
Nox, you're not helping.
Tumblr media
"The hell is she sending me to ask about food preferences for?"
Soyi would be making his way back upstairs at the Matriarch's request, although he was definitely caught off-guard by what she'd asked of him.
"I mean, what am I supposed to ask? 'Hey, what do gods like to eat? The souls of the damned? The souls of the innocent? Bagels?' Gimme a damn break..."
Okay, maybe he and certain other people should lay off of binge-watching meme videos for a little while...
3 notes · View notes
magicandcuriosity · 2 months ago
Text
OneShot muses are being moved!
After a bit of deliberation, I've decided to move my OneShot muses over to a new blog to keep things organized. That blog is @of-the-new-world - if you want more of my OneShot muses and OCs, follow me there!
0 notes
magicandcuriosity · 2 months ago
Text
My Burden Is... (Solstice drabble)
Tumblr media
"...you know, despite Niko and I being close friends, our adventures through the New World weren't always sunshine and rainbows. I mean, of course they weren't, given the nature of that place. But there was one time... during our second journey... that I almost broke. It was during our visit to the mines that went off-script..."
...............
"...Jake?"
The question caught Jake off-guard, as he wasn't expecting to be able to communicate with Niko at this point. He wasn't able to before... but things must have changed since then. "...yeah?"
"I don't... understand." Niko's voice is quiet - wavering. "The world... the Prophetbot; what he was saying... is this world really just... just......"
[From Jake's perspective, The World Machine isn't all that special. It's no different from other recreational, game-type software they may have installed on their computer.]
Jake isn't too proud to admit that he spent a few minutes yelling at the screen after hearing the Prophetbot prototype say that... but it's not like anybody could have heard him.
"...it's... complicated."
"I don't care if it's complicated! Tell me the truth!"
Niko's voice was raised now, as fear and sorrow give way to anger.
"YES!"
No sooner did that word leave Jake's mouth than he realizes exactly how he sounds right now, and he stops himself. He takes a slow, shaky breath. "...yes. That's the simplest way of putting it."
Niko is quiet for a good, long while. "...normally I wouldn't believe it, but... it just... adds up. Everything... adds up."
Jake rubs his temples, slumping down in his seat. "...I'm sorry."
"He said... you can bring me back... and he needs my help to fix things?" Niko shakes their head, their voice raising again. "I don't get it! Why didn't you tell me anything???"
"Do you honestly think I asked for this?!" Now Jake was shouting, too.
"I didn't ask for this!" Niko snaps back, tears starting to stream down their face. "I don't even know what I'm supposed to do! If I can't fix this world... I can't go back home... but the world is already so messed up. If the squares don't get fixed... what will happen to the world? Where would I even go?"
Jake opens his mouth, but finds that he can't think of anything to say. Upon getting no response, Niko also falls silent, curling up in the minecart that was currently heading who-knows-where. Jake could hear them crying, but how could he comfort them...
...when he didn't even know how to comfort himself?
...............
The mine cart finally comes to a stop near the green-tinged ground of the ruins in the Glen. Niko's tears had stopped a little while ago, and they finally speak again. "...I... think I remember something. I remember... what I did at the end."
Jake looks at the screen, but he can't bring himself to say anything.
"I remember... putting in the sun... and then everything got really bright... I don't remember a lot of the details."
Niko gets out of the mine cart.
"...but none of it matters now, does it? I just got brought back anyway."
"Niko..." Now Jake's voice was the one that was quiet, shaky... on the verge of breaking completely. That alone causes Niko to pause, looking at Jake with sad eyes... before nodding resolutely.
"We can't go back now, Jake. No matter what happened back then... I trusted you. And... I still trust you. So... we need to keep going."
"...yeah." Jake takes a breath, regaining his composure, before sitting up straight and putting his hands on the keyboard again. "...whatever happens, I'll do my best to keep you safe. I promise."
0 notes
magicandcuriosity · 2 months ago
Text
Tumblr media
In the night I woke to see A land of darkness came to me The silence heard me as I breathed And I heard it just the same
Then I saw a brighter screen In the light I'd rather be
Tumblr media
Ever wondered what it means When a system calls your name?
In the basement, oh the basement In the darkest of the dark Laid a glowing orb, the sun of course A fire without a spark
Under all the fuss, and all the rust The world's a work of art
Tumblr media
So let's make it right, my burden's light So let it all shine bright
Tumblr media
[You've only got the one shot] [So let it ride and let them leave] [They're living, breathing - not a slave to a broken machine] [You've only got the one shot] [So hold it tight and best believe] [A heart that's beating can't belong to a broken machine]
Tumblr media
Through the pixels and the trees I met a world that's far from free At the heart, a fading beat Oh, corruption's had its way
Squares and errors live the dream Running rampant at the scene No design or color scheme No control within the game
Tumblr media
No replacement, no replacement No, this light's one of a kind It needs our support to move towards The tower in the sky
If your hope is known to shatter And you doubt that we'll survive Keep your head up high, you'll be my guide We'll let it all shine bright
Tumblr media
[You've only got the one shot] [So let it ride and let them leave] [They're living, breathing - not a slave to a broken machine] [You've only got the one shot] [So hold it tight and best believe] [A heart that's beating can't belong to a broken machine…]
Tumblr media
I never had just one shot I want to save you, too - you'll see You're tamed, you know… you're anything but a broken machine So I'll defy my one shot I'll keep on going 'til you see Your heart is beating - you are far from a broken machine
1 note · View note
magicandcuriosity · 2 months ago
Text
Some point in the distant future, after meeting the Author, Jake works together with him to improve Hazel - the World Machine. Eventually, they get it to the point that Jake is able to call Niko back to the New World.
Tumblr media
[Even though I was heavily against the idea at first...]
At that time, holiday celebrations were happening in Niko's world. Because of this, Niko had a lot of presents to give everybody in the New World - including Hazel themselves. The present?
Tumblr media Tumblr media
And as for Jake, while Niko wouldn't be able to give him a gift physically, Hazel was still able to convert that gift - a small snowglobe - into a program on the system... after making a copy for themselves, of course.
It would be shortly after that point that Jake and the Author start working on a new project - programming a digital avatar for Jake to personally explore the New World, since that was something he was unable to do previously. The development process is nearly complete at this point.
Naturally, Jake knows the ramifications of bringing Niko back to the New World... he hasn't attempted to call Niko again since then. But he knows that no goodbye is truly final if you don't want it to be.
0 notes
magicandcuriosity · 2 months ago
Text
Back then, I told you about the Entity as little as possible. Apologies for that - I didn't want to put the librarian in danger. This being has a habit of silencing the people who learn of its true nature. Regrettably, I've seen it happen to dear friends...
Ah, but do not worry. The Entity cannot touch you... nor can it do anything to me. I already left the world on my own terms. I... never meant for the Entity to exist. But now that it's fully sentient, one thing became clear... the Entity seeks death. Death to itself, death to the world... a relentless desire that manifested physically. You have already seen the scars.
Right now, the Entity is doing everything it can to impede your progress, stalling for even a few minutes before you inevitably bring the sun to the tower's summit. That is where you will make the final judgment for the world. Of course, the Entity will contact you again there - and when it does, it will trick you into shattering the sun. This will end the world instantly.
...
......
No, no... it is not that simple. I am sorry. I do not know what to do in a situation like this... but I think I have to tell you the truth.
The sun is the savior's tie to the world. As long as the sun is intact, the savior remains trapped here. Shattering the sun may terminate this world, but... it's also the only way for the savior to return home. I did not realize things could end up like this...
...please forgive me.
Tumblr media
Samuel, the Author (Spoilers ahead)
The creator of the World Machine, and one of the last surviving members of the Old World.
Helped the Player and Niko multiple times during their adventures through the New World, although they'd never met face-to-face at that point.
They're currently in the Player's world after a chance encounter. There, they're helping fine-tune the World Machine and learning more about the Player in the process.
They do miss Cedric and Rue, but they feel like the two of them would fare better in the New World without him - besides, forming a mental link with the World Machine while the physical body remains outside would have its own share of risks.
However, he still keeps in contact with the two of them - thanks to being the creator of the World Machine, he has his ways.
1 note · View note
magicandcuriosity · 2 months ago
Text
An important addition that also contains Solstice spoilers, so we're going under another cut for this one.
Niko's Porygon-Z has remarkably few glitches for being what it is. As a matter of fact, it seems calm and serene - of course, it still looks like a normal Porygon-Z, but it's less glitchy... and more powerful.
Tumblr media
This is due to Niko 'taming' the Porygon-Z - fitting, given what it's supposed to represent. Of course, Niko isn't aware of the power that their Porygon-Z has... just that it was a lot more glitchy before Niko spent time bonding with it.
If Niko had a Pokemon team
...if you think I'm going to be giving this 11-year-old a Legendary, you're out of your mind (they've already been through enough stuff). With that being said, here's a list of Pokemon along with their inspiration.
Note: aside from the Pokemon listed below, Niko also has an Espeon that they rely on for emotional support. Kid's been through a lot, after all.
Solrock (gee, I wonder. Could have went with Tadbulb for this, but eh.)
Corviknight (Calamus and Alula) (yes I know Corviknight doesn't give off those vibes but Niko caught it as a Rookidee and didn't know it would evolve into... well, that)
Lilligant (Maize)
Solstice Route spoilers after the cut; you've been warned.
Xatu (Prototype)
Ninetales (Rue)
Porygon-Z (The World Machine)
3 notes · View notes