Active Exploits

Active Exploits

Infobox RPG
title= Active Exploits


caption="Active Exploits diceless roleplaying"
publisher=Precis Intermedia Gaming
designer=Brett M. Bernstein
date=2002-2003
genre=Universal
system=Diceless
footnotes=

Active Exploits is a diceless set of role-playing game rules by Precis Intermedia Gaming. The core rules (which contain no setting) are distributed for free as a pdf file, or for a fee as a printed book. There are a number of published game settings and official game conversions which use these rules.

The system is considered innovative, but more in common with GURPS and Unisystem, rather than other diceless games such as Amber and Nobilis [Cite web
title = RPGnet : Review of Active Exploits Take 2
accessdate = 2007-10-27
url = http://www.rpg.net/reviews/archive/11/11964.phtml
]

The game has options for freeform and live action role-playing, as well as for converting the game to other systems. Ample conversion rules allow the adaptation of the engine to a number of commercial systems.

Published Settings and Official Conversions

Active Exploit has converted other published RPGs into diceless versions.
*, a role-playing game based in Feudal Japan. [Cite web
title = The Award-Winning Sengoku goes Diceless. | RPG Herald
accessdate = 2007-10-25
url = http://www.rpgswap.com/story/the_award_winning_sengoku_goes_diceless
]
*Dreamwalker, a setting taking place in others' dreams. [Cite web
title = Dreamwalker - RPG Reviews - GameWyrd
accessdate = 2007-10-25
url = http://www.gamewyrd.com/review/276
]
*Blood Island Diceless, swashbuckling adventures on the high seas. [Cite web
title = Bloode Island Diceless - RPG Reviews - GameWyrd
accessdate = 2007-10-25
url = http://www.gamewyrd.com/review/358
]
*CORPS Diceless, based on CORPS, a conspiracy themed RPG about UFOs, vampires, secret societies, etc.. [Cite web
title = CORPS: Diceless Conspiracy Roleplaying - RPG Reviews - GameWyrd
accessdate = 2007-10-25
url = http://www.gamewyrd.com/review/318
]

Awards

The game won an Indie RPG award in 2003 for free game of the year and best support. [Cite web
title = 2003 Indie RPG Awards
accessdate = 2007-10-25
url = http://rpg-awards.com/2003/bestsupport.shtml
]

Modes of Play

Basic Exploits

This is an introductory version of the rules, intended for those who are new to the system or prefer something less involved.Cite web
title = Precis Intermedia :: Active Exploits Diceless
accessdate = 2007-09-07
url = http://www.pigames.net/store/default.php?cPath=21
]

Advanced Exploits

This presents both advanced and optional rules which players can selectively use. Some examples of advanced elements are:

*Flairs: These zoom in on character's abilities.
*Fields of Expertise: These replace the need for skills by generalizing occupational knowledge.
*Convictions: These expand on the basic concept of Principles (in Basic Exploits) by utilizing Revelation and Dementia.
*Threads: These define group dynamics and help encourage more character-oriented roleplaying.
*Vehicles: Rules for using vehicles, from motorcycles to starships.

Live Exploits

These are guidelines from the Basic and Advanced Exploits sections which are optimized for live action role-playing.

Adaptive Exploits (Special Edition Softcover only)

A framework for converting characters from other game systems for use with Active Exploits, and adapting other ability/skill-based systems for diceless play.

Other features

Setting Specifics, which add new rules for magic and the occult, and martial arts.

References

External links

* [http://www.pigames.net/store/default.php?cPath=21 Active Exploits]
* [http://www.rpg.net/reviews/archive/11/11964.phtml Review on RPG.net]


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Active management — (also called active investing) refers to a portfolio management strategy where the manager makes specific investments with the goal of outperforming an investment benchmark index. Investors or mutual funds that do not aspire to create a return in …   Wikipedia

  • Diceless role-playing game — A diceless role playing game is a role playing game which is not based on chance: it does not use randomisers to determine the outcome of events in its role playing game system. The style of game is known as diceless because most games use dice… …   Wikipedia

  • List of role-playing games by genre — This is a list of role playing games, subdivided by genre (although many games do not fit clearly into one genre or another). It does not include computer role playing games, MMORPGs, or any other video games with RPG elements. Most of these… …   Wikipedia

  • Precis Intermedia Gaming — Infobox Company company name = Precis Intermedia company vector company type = genre = foundation = founder = location city = location country = USA location = origins = key people = area served = industry = Role playing products = Two Fisted… …   Wikipedia

  • Cheating in online games — is an activity that modifies the game experience to give one player an advantage over others.[1] Depending on the game, different activities constitute cheating and it is either a matter of game policy or consensus opinion as to whether a… …   Wikipedia

  • biblical literature — Introduction       four bodies of written works: the Old Testament writings according to the Hebrew canon; intertestamental works, including the Old Testament Apocrypha; the New Testament writings; and the New Testament Apocrypha.       The Old… …   Universalium

  • Judaism — /jooh dee iz euhm, day , deuh /, n. 1. the monotheistic religion of the Jews, having its ethical, ceremonial, and legal foundation in the precepts of the Old Testament and in the teachings and commentaries of the rabbis as found chiefly in the… …   Universalium

  • Hacker (computer security) — This article is part of a series on …   Wikipedia

  • Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… …   Wikipedia

  • Metasploit Project — Metasploit Metasploit Community showing three hosts, two of which were compromised by an exploit …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”