Welcome Guest
[Log In]
[Register]
- Pages:
- 1
- 2
| Homebrew Class Track - Netrunner | |
|---|---|
| Tweet Topic Started: Jul 14 2015, 08:20 PM (907 Views) | |
| Divergent Reality | Dec 4 2015, 11:09 AM Post #11 |
|
Quality Not Guaranteed!
|
Netrunner Cards. Here you go. I'm going to advise against searching for "Shadowrun Unwired pdf" because you might find illegal copies available to download. Edited by Divergent Reality, Dec 4 2015, 11:18 AM.
|
![]() |
|
| Guest | Dec 4 2015, 11:15 AM Post #12 |
|
Unregistered
|
thats pretty cool, thanks. |
|
|
| Guest | Dec 4 2015, 01:16 PM Post #13 |
|
Unregistered
|
so, 13 ICE programs to 5 ICE-Breakers here are a few Ideas I've Spit-Balled for programs. Parasite(rare) the hacker selects a target ICE within a system; for every round of cybercombat against that ICE while Parasite is active decrease it's strength by 5. any ICE reduced to 0 Strength by this program may be bypassed by leaving Parasite running. Subroutines deep in Parasites code, left by a puckish creator prevent more than one from running at a time on any system Yog-Sothoth(common) hacker gains +2k0 for hacking on the fly attempts. the user must update this program from the local database for every new station/planet/crystal sphere; take a TN 20 Tech-Use test to locate the server with the update, this test may be re-rolled every 4 hours. "there's always a keeper of keys" Data crumbler(Ubiquitous) at the conclusion of a hack this program may be installed onto the system; it then deletes every non-essential, non-life-support, file or data. then it fills the drive with randome information, deletes that, repeats several times before leaving the system bereft of any recoverable information. "the hardcore fetish porn it usually leaves behind is always a bonus..." Baitworms(uncommon) a hacker may install this on any system or series of systems. at a given signal or pre-arranged time the program will boot up and execute an obvious and inept attack against a pre-selected system. the distraction of dealing with baitworms takes ICE hosted on the target system one turn to counter "HEY! LOOK OVER THERE!" what do you think? |
|
|
| Guest | Dec 8 2015, 12:02 AM Post #14 |
|
Unregistered
|
Hot-Slot Chip(uncommon) may only be used once per hack. when hacking a system directly this chip allows the instant use of an extra action. "it's a pitty that most terminals only have ont Hot-Slot, giggedy" Hacking Nexus Cogitator(rare) +3k0 to remote hacking actions unit must be anchored to a stationary location (or a spelljammer moving at a constant speed without maneuvering) if the unit moves or its location is damaged by explosives all hacking actions are made at -2k1 untill the unit can be stabilized with a TN-15 test "Heat, and Vibration are the greatest enemies of computers" Clone Chip(ubiquitous) if an ICE program has been defeated with a rewrite action it may be copied on the spot with Tech use check. target number of the tech use check depends on the rarity of the ICE (ubiquitous=5; very common=10; common=15; uncommon=20; rare=30; Mythic rare=40) "sometimes it's cheaper to just steal someone else's ICE for your systems" Shinobi(ICE; uncommon) every success this ICE gains in counter-hacking adds a system tag to the system being used to hack it. any Tech Use result of 30 or greater on a tagged system reveals the tags on the system, Tech Use TN=25 to remove if a tagged system connects to a sufficiently wide network; security officer, law enforcement, or bounty hunters are alerted to the location of the tagged system "This is why we quarantine the hacking decks!" |
|
|
| 1 user reading this topic (1 Guest and 0 Anonymous) | |
| « Previous Topic · Classes · Next Topic » |
- Pages:
- 1
- 2
| Theme: Zeta Original | Track Topic · E-mail Topic |
2:09 PM Jul 11
|







2:09 PM Jul 11