
by Wealdan
When FBI's Most Wanted hacker Alexandria "Hex" Volkov gets isekai'd mid-arrest, she discovers magic is just poorly written code—and she's about to become the world's first cybersecurity threat to the divine. Most people see fireballs and lightning bolts. Hex sees SQL injections waiting to happen. In a fantasy world running on the Covenant Operating System magic is treated as mystical wonder. But Hex can see the truth: every spell is a program, every enchantment is exploitable code, and the entire reality is just one massive server farm badly in need of a security audit. There's just one problem: she doesn't exist in the system database. No user profile. No character class. No assigned stats. She's a null pointer in a world that doesn't handle exceptions well. Armed with nothing but handcuffs from her old life and a black-hat hacker's instinct for finding vulnerabilities, Hex must: Decompile enemy spells mid-combat and patch them on the flyBuild a botnet from defeated foes to boost her processing powerAvoid System Administrators (literal gods) who can smite exploitersUncover why the System is failing and why she's the only one who can see itDecide whether to crash the whole divine operating system or become its worst nightmare From jailbreaking reality itself to staging a hostile takeover of heaven's data center, Hex will prove that the best debugging tool is a crowbar—and that every system, no matter how divine, has a vulnerability. She doesn't cast spells. She exploits them. New chapters posted Monday, Wednesday, Friday and Saturday
| # | Title | Words |
|---|---|---|
| 0 | Chapter 1: Stack Overflow | 0 |
| 1 | Chapter 2: Null Pointer Exception | 0 |
| 2 | Chapter 3: Read the Manual | 0 |
| 3 | Chapter 4: Social Engineering | 0 |
| 4 | Chapter 5: Infiltration | 0 |
| 5 |
| Chapter 6: Bug Report |
| 0 |
| 6 | Chapter 7: Training Montage | 0 |
| 7 | Chapter 8: Noble Privileges | 0 |
| 8 | Chapter 9: The Cromwell Hack | 0 |
| 9 | Chapter 10: The Raid | 0 |
| 10 | Chapter 11: The Safe House Network | 0 |
| 11 | Chapter 12: Teacher and Student | 0 |
| 12 | Chapter 13: Follow the Money | 0 |
| 13 | Chapter 14: The Paper Trail | 0 |
| 14 | Chapter 15: System Diagnostics | 0 |
| 15 | Chapter 16: The Hunter | 0 |
| 16 | Chapter 17: Close Calls | 0 |
| 17 | Chapter 18: The Baiting | 0 |
| 18 | Chapter 19: The Resistance Schism | 0 |
| 19 | Chapter 20: Declaration of War | 0 |
| 20 | Chapter 21: Escape and Cover | 0 |
| 21 | Chapter 22: Boss Fight Mechanics | 0 |
| 22 | Chapter 23: Mundane Work | 0 |
| 23 | Chapter 24: Showing Improvement | 0 |
| 24 | Chapter 25: Gold Standard | 0 |
| 25 | Chapter 26: Forge Keeper | 0 |
| 26 | Chapter 27: The Confrontation | 0 |
| 27 | Chapter 28: Administrative Attention | 0 |
| 28 | Chapter 29: Reading the Data | 0 |
| 29 | Chapter 30: Laying Low | 0 |
| 30 | Chapter 31: Lyssa's Investigation | 0 |
| 31 | Chapter 32: Shared History | 0 |
| 32 | Chapter 33: The Earth Connection | 0 |
| 33 | Chapter 34: Pattern Recognition | 0 |
| 34 | Chapter 35: Communication Protocol | 0 |
| 35 | Chapter 36: Silver Rank Advancement | 0 |
| 36 | Chapter 37 Platinum Dungeon Observation | 0 |
| 37 | Chapter 38: What Watchers Watch | 0 |
| 38 | Chapter 39: The Kernel Waste References | 0 |
| 39 | Chapter 40: Borrowed Time | 0 |
| 40 | Chapter 41: Fifteen Dead | 0 |
| 41 | Chapter 42: Kane's Message | 0 |
| 42 | Chapter 43: Ideological Conflict | 0 |
| 43 | Chapter 44: Kane's Operative | 0 |
| 44 | Chapter 45: The Split Solidifies | 0 |
| 45 | Chapter 46: Detection | 0 |
| 46 | Chapter 47: Borderlands Flight | 0 |
| 47 | Chapter 48: Hunter Adaptation | 0 |
| 48 | Chapter 49: Frontier Territories | 0 |
| 49 | Chapter 50: The Trap | 0 |
| 50 | Chapter 51: Analysis | 0 |
| 51 | Chapter 52: Hunter's Knowledge | 0 |