Welcome to IOPWiki, Commander.
With the release of the new game, we encourage contributions to topics related to Girls' Frontline 2. Learn how to contribute, read the maintenance guide, and join our Discord server to discuss major changes.
If you or someone you know can help deciphering the game files, contact our administrator.

GFL2 Story

Welcome to IOP Wiki. This website is maintained by the Girls' Frontline community and is free to edit by anyone.
Jump to navigation Jump to search

"I can't sleep yet, I still have work to do..."

This article still needs to be completed with this content: CN story.
You can help us by contributing.

Girls' Frontline 2: Exilium
Dolls List · Items List · Events List · Weapons List · Weapon Accessories List · Costumes List · Enemy List · NPCs List · Story (Battlefield Echoes · Classified Briefings · Loading Screens) · Music
Servers & Clients · Main Screen Guide · Combat · Doll Enhancement · Dormitories & Dispatch · Strategies


Summary[edit]

Main Story[edit]

Chapter 1: Double Pendulum Simulation[edit]

1-1: Formulate[edit]

1-2: Arc of Light[edit]

1-3: Puncture Point[edit]

SL-1-1: Euler Lotka Equation[edit]

1-4: Merge[edit]

SL-1-2: Semantic Satiation[edit]

1-5: Zero-Piece Interlock[edit]

1-6: Equivalent Exchange[edit]

1-7: Transfer I[edit]

1-8: Transfer II[edit]

Chapter 2: Second Signal[edit]

2-1: Guess[edit]

SL-2-1: Intersection[edit]

2-2: Arrogance[edit]

2-3: Diffraction[edit]

SL-2-2: Convergence[edit]

2-4: Disturbance[edit]

2-5: Simulated Defense[edit]

2-6: Narrow Path I[edit]

2-7: Narrow Path II[edit]

2-8: Wolf Pack Assault[edit]

SL-2-3: Price[edit]

2-9: Signal[edit]

SL-2-4: Paradox Loop[edit]

2-10: Black Swan[edit]

SL-2-5: Final Curtain[edit]

Chapter 3: Lacuna Rectification[edit]

SL-3-1: The Object[edit]

3-1: Penetration[edit]

SL-3-2: First Encounter[edit]

3-2: Preparation I[edit]

3-3: Preparation II[edit]

3-4: Silent Echo[edit]

SL-3-3: Fault Line[edit]

3-5: Self-Adaptive[edit]

3-6: Negotiation[edit]

3-7: Primary Plan[edit]

SL-3-4: Time-Variant[edit]

3-8: Exclude[edit]

SL-3-5: Virtual Reflection[edit]

3-9: Capturing[edit]

3-10: Chaotic Field[edit]

Chapter 4: Reverse Matrix[edit]

4-1: Chemotaxis[edit]

SL-4-1: Backtracing[edit]

4-2: First Occupancy Theory[edit]

4-3: Ambush[edit]

4-4: Annihilation[edit]

SL-4-2: Armed to the Teeth[edit]

4-5: Invasion I[edit]

4-6: Invasion II[edit]

SL-4-3: Multidimensional Paradox[edit]

4-7: Stress Reaction[edit]

4-8: Turbulence[edit]

SL-4-4: Solipsism[edit]

4-9: Ligne de Fuite[edit]

4-10: Dead-End[edit]

SL-4-5: The Death of Antigone[edit]

SL-4-6: Post-Truth[edit]

Chapter 5: Heterodyne Resonance[edit]

SL-5-1: Jostled Cradle[edit]

5-1: Breakthrough I[edit]

5-2: Obstacle Clearing[edit]

5-3: Transient Reflection[edit]

5-4: Quantum Light[edit]

SL-5-2: Waveform Deviation[edit]

5-5: Dark Passage[edit]

SL-5-3: Anomalous Conductor[edit]

5-6: Bilateral Constraint[edit]

5-7: Random Medium[edit]

5-8: Breaktrough II[edit]

5-9: Breaktrough III[edit]

SL-5-4: Ebb and Flow[edit]

5-10: Combined Parameters[edit]

Chapter 6: Harmonic Cycle[edit]

6-1: Dramatic Shift[edit]

SL-6-1: Backscattering[edit]

6-2: Vortex Field[edit]

6-3: Gravitational Potential Field[edit]

6-4: Impedance Boundary[edit]

SL-6-2: Ideal String[edit]

6-5: Sneak Attack I[edit]

6-6: Encounter Hypothesis[edit]

SL-6-3: Wavefront[edit]

6-7: Reimaging[edit]

SL-6-4: Discordant Note[edit]

6-8: Sneak Attack II[edit]

SL-6-5: Rules of Bartering[edit]

6-9: Sneak Attack III[edit]

6-10: Critical Angle[edit]

Chapter 7:[edit]

Chapter 8:[edit]