| Simple Actions | Marks | Note | Test: Source | d6 |
| Change Icon | Owner | Change target icon, or self | ||
| Data Processing | Miscellaneous | |||
| Check Overwatch Score | - | Get OS from GM | Electronic Warfare [] + Logic [3] | [3d6] |
| Sleaze | Information Gathering | 6d6 | ||
| Invite Mark | Owner | Choose # of Marks and Duration | ||
| Data Processing | Mark Manipulation | |||
| Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [5] | [5d6] |
| Firewall | Miscellaneous | Logic + Attack | ||
| Send Message | - | Send short sentence, image, or file to user. | ||
| Data Processing | Miscellaneous | |||
| Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
| Data Processing | Miscellaneous | |||
| Complex Actions | Marks | Note | Test: Source | d6 |
| Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [3] | [3d6] |
| Sleaze | Device Manipulation | Willpower + Firewall | ||
| Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [3] | [3d6] |
| Data Processing | Device Manipulation | Willpower + Firewall | ||
| Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [6] | [6d6] |
| Sleaze | Device Manipulation | Logic + Firewall | ||
| Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [3] | [3d6] |
| Sleaze | Device Manipulation | Logic + Firewall | ||
| Crack File | 1 | Remove File Protection | Hacking [] + Logic [3] | [3d6] |
| Attack | File Manipulation | 2 * Protection Rating | ||
| Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [6] | [6d6] |
| Firewall | File Manipulation | 2 * Data Bomb Rating | ||
| Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [3] | [3d6] |
| Data Processing | File Manipulation | Intuition + Firewall | ||
| Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [3] | [3d6] |
| Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
| Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [6] | [6d6] |
| Data Processing | Information Gathering | Logic + Sleaze | ||
| Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [] + Intuition [6] | [6d6] |
| Sleaze | Information Gathering | Logic + Firewall | ||
| Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [6] | [6d6] |
| Data Processing | Information Gathering | Willpower + Sleaze | ||
| Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | Willpower + Firewall | ||
| Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
| Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | Willpower + Firewall | ||
| Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [3] | [3d6] |
| Sleaze | Mark Manipulation | Intuition + Firewall | ||
| Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [3] | [3d6] | |
| Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
| Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Matrix Combat | Intuition + Firewall | ||
| Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Matrix Combat | Intuition + Firewall | ||
| Enter / Exit host | 1 | Exit Host to where you entered from | ||
| Data Processing | Miscellaneous | |||
| Grid Hop | - | Mast have permission, must leave host first | ||
| Data Processing | Miscellaneous | |||
| Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [] + Intuition [6] | [6d6] |
| Sleaze | Miscellaneous | Intuition + Data Processing | ||
| Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [] + Logic [3] | [3d6] |
| Attack | Miscellaneous | |||
| Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [] + Logic [3] | [3d6] |
| Data Processing | Miscellaneous | Willpower + Firewall |
| name | modified | dicepool | specialization |
|---|---|---|---|
| Outdoors Group | 2 | ||
| Flight | 4 | 7 | |
| Navigation | 2 | 8 | |
| Perception | 4 | 10 | |
| Sneaking | 3 | 6 | |
| Survival | 2 | 7 | |
| Tracking | 4 | 10 | |
| Tracking | 2 | 8 | |
| Unarmed Combat | 5 | 8 |
| Attribute | Rating |
|---|---|
| Body | 4 |
| Agility | 3 |
| Reaction | 3 |
| Strength | 4 |
| Willpower | 5 |
| Logic | 3 |
| Intuition | 6 |
| Charisma | 3 |
| Essence | 6 |
| Edge | 3 |
| Initiative | 9 |
| Simple Actions | Marks | Note | Test: Source | d6 |
| Change Icon | Owner | Change target icon, or self | ||
| Data Processing | Miscellaneous | |||
| Check Overwatch Score | - | Get OS from GM | Electronic Warfare [] + Logic [4] | [4d6] |
| Sleaze | Information Gathering | 6d6 | ||
| Invite Mark | Owner | Choose # of Marks and Duration | ||
| Data Processing | Mark Manipulation | |||
| Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [4] | [4d6] |
| Firewall | Miscellaneous | Logic + Attack | Hermes Ikon [4d6] | |
| Send Message | - | Send short sentence, image, or file to user. | ||
| Data Processing | Miscellaneous | |||
| Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
| Data Processing | Miscellaneous | |||
| Complex Actions | Marks | Note | Test: Source | d6 |
| Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [4] | [4d6] |
| Sleaze | Device Manipulation | Willpower + Firewall | Hermes Ikon [9d6] | |
| Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [4] | [4d6] |
| Data Processing | Device Manipulation | Willpower + Firewall | Hermes Ikon [9d6] | |
| Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [4] | [4d6] |
| Sleaze | Device Manipulation | Logic + Firewall | Hermes Ikon [9d6] | |
| Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [4] | [4d6] |
| Sleaze | Device Manipulation | Logic + Firewall | Hermes Ikon [9d6] | |
| Crack File | 1 | Remove File Protection | Hacking [] + Logic [4] | [4d6] |
| Attack | File Manipulation | 2 * Protection Rating | ||
| Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [4] | [4d6] |
| Firewall | File Manipulation | 2 * Data Bomb Rating | ||
| Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [4] | [4d6] |
| Data Processing | File Manipulation | Intuition + Firewall | Hermes Ikon [9d6] | |
| Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [4] | [4d6] |
| Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
| Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [4] | [4d6] |
| Data Processing | Information Gathering | Logic + Sleaze | Hermes Ikon [4d6] | |
| Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [] + Intuition [4] | [4d6] |
| Sleaze | Information Gathering | Logic + Firewall | Hermes Ikon [9d6] | |
| Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [4] | [4d6] |
| Data Processing | Information Gathering | Willpower + Sleaze | Hermes Ikon [4d6] | |
| Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [4] | [4d6] |
| Attack | Mark Manipulation | Willpower + Firewall | Hermes Ikon [9d6] | |
| Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [4] | [4d6] |
| Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
| Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [4] | [4d6] |
| Attack | Mark Manipulation | Willpower + Firewall | Hermes Ikon [9d6] | |
| Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [4] | [4d6] |
| Sleaze | Mark Manipulation | Intuition + Firewall | Hermes Ikon [9d6] | |
| Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [4] | [4d6] | |
| Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
| Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [4] | [4d6] |
| Attack | Matrix Combat | Intuition + Firewall | Hermes Ikon [9d6] | |
| Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [4] | [4d6] |
| Attack | Matrix Combat | Intuition + Firewall | Hermes Ikon [9d6] | |
| Enter / Exit host | 1 | Exit Host to where you entered from | ||
| Data Processing | Miscellaneous | |||
| Grid Hop | - | Mast have permission, must leave host first | ||
| Data Processing | Miscellaneous | |||
| Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [] + Intuition [4] | [4d6] |
| Sleaze | Miscellaneous | Intuition + Data Processing | Hermes Ikon [9d6] | |
| Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [] + Logic [4] | [4d6] |
| Attack | Miscellaneous | |||
| Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [] + Logic [4] | [4d6] |
| Data Processing | Miscellaneous | Willpower + Firewall | Hermes Ikon [9d6] |
| Ruger Super Warhawk [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Armor Clothing [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Certified Credstick, Gold [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 5 |
| Firewall | 5 |
| Hermes Ikon [10] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 5 |
| Firewall | 5 |
| Magical Lodge Materials [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Sustaining Focus [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| name | modified | dicepool | specialization |
|---|---|---|---|
| Assensing | 1 | 5 | |
| Banishing | 1 | 7 | |
| Binding | 2 | 8 | |
| Con | 2 | 6 | |
| Counterspelling | 2 | 8 | |
| Etiquette | 2 | 6 | |
| Negotiation | 1 | 5 | |
| Perception | 1 | 5 | |
| Pistols | 6 | 11 | Revolvers +2 |
| Ritual Spellcasting | 2 | 8 | |
| Sneaking | 1 | 6 | |
| Spellcasting | 3 | 9 | |
| Summoning | 2 | 8 | |
| 4th World History | 4 | 8 | |
| Legendary Runners | 3 | 7 | |
| English | 6 | 10 | |
| Japanese | 3 | 7 | |
| Sperethiel | 1 | 5 |
| Attribute | Rating |
|---|---|
| Body | 2 |
| Agility | 5 |
| Reaction | 3 |
| Strength | 2 |
| Willpower | 4 |
| Logic | 4 |
| Intuition | 4 |
| Charisma | 4 |
| Essence | 6 |
| Edge | 8 |
| Magic | 6 |
| Initiate Grade | 1 |
| Initiative | 7 |
| Simple Actions | Marks | Note | Test: Source | d6 |
| Change Icon | Owner | Change target icon, or self | ||
| Data Processing | Miscellaneous | |||
| Check Overwatch Score | - | Get OS from GM | Electronic Warfare [4] + Logic [7] | [11d6] |
| Sleaze | Information Gathering | 6d6 | ||
| Invite Mark | Owner | Choose # of Marks and Duration | ||
| Data Processing | Mark Manipulation | |||
| Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [4] | [4d6] |
| Firewall | Miscellaneous | Logic + Attack | ||
| Send Message | - | Send short sentence, image, or file to user. | ||
| Data Processing | Miscellaneous | |||
| Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
| Data Processing | Miscellaneous | |||
| Complex Actions | Marks | Note | Test: Source | d6 |
| Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [7] | [7d6] |
| Sleaze | Device Manipulation | Willpower + Firewall | ||
| Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [7] | [7d6] |
| Data Processing | Device Manipulation | Willpower + Firewall | ||
| Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [4] | [4d6] |
| Sleaze | Device Manipulation | Logic + Firewall | ||
| Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [7] | [7d6] |
| Sleaze | Device Manipulation | Logic + Firewall | ||
| Crack File | 1 | Remove File Protection | Hacking [] + Logic [7] | [7d6] |
| Attack | File Manipulation | 2 * Protection Rating | ||
| Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [4] | [4d6] |
| Firewall | File Manipulation | 2 * Data Bomb Rating | ||
| Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [7] | [7d6] |
| Data Processing | File Manipulation | Intuition + Firewall | ||
| Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [7] | [7d6] |
| Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
| Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [4] | [4d6] |
| Data Processing | Information Gathering | Logic + Sleaze | ||
| Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [4] + Intuition [4] | [8d6] |
| Sleaze | Information Gathering | Logic + Firewall | ||
| Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [4] | [4d6] |
| Data Processing | Information Gathering | Willpower + Sleaze | ||
| Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [7] | [7d6] |
| Attack | Mark Manipulation | Willpower + Firewall | ||
| Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [7] | [7d6] |
| Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
| Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [7] | [7d6] |
| Attack | Mark Manipulation | Willpower + Firewall | ||
| Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [7] | [7d6] |
| Sleaze | Mark Manipulation | Intuition + Firewall | ||
| Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [7] | [7d6] | |
| Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
| Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [7] | [7d6] |
| Attack | Matrix Combat | Intuition + Firewall | ||
| Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [7] | [7d6] |
| Attack | Matrix Combat | Intuition + Firewall | ||
| Enter / Exit host | 1 | Exit Host to where you entered from | ||
| Data Processing | Miscellaneous | |||
| Grid Hop | - | Mast have permission, must leave host first | ||
| Data Processing | Miscellaneous | |||
| Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [4] + Intuition [4] | [8d6] |
| Sleaze | Miscellaneous | Intuition + Data Processing | ||
| Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [4] + Logic [7] | [11d6] |
| Attack | Miscellaneous | |||
| Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [4] + Logic [7] | [11d6] |
| Data Processing | Miscellaneous | Willpower + Firewall |
| Ares Light Fire 75 [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Colt Government 2066 [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Colt Inception [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Combat Knife [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Defiance EX Shocker [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Enfield AS-7 [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Sapphire Knife [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Throwing Knife [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Underbarrel Grenade Launcher [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Bone Lacing (Aluminum) [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Executive Suite [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Industrious [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Riot Control Armor [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Autopicker [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Concealable Holster [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Concealable Holster [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Magecuff [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Metal Restraints [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Plasteel Restraints [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Shop, Locksmithing [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Smart Wig [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Smart Wig (w/ Trode Net) [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Synthskin Face Mask [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Synthskin Face Mask [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Tool Kit, Hand Loading [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Tool Kit, Locksmithing [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| name | modified | dicepool | specialization |
|---|---|---|---|
| Engineering Group | 1 | ||
| Stealth Group | 1 | ||
| Aeronautics Mechanic | 1 | 8 | |
| Automotive Mechanic | 1 | 8 | |
| Blades | 5 | 8 | |
| Disguise | 1 | 5 | |
| Electronic Warfare | 4 | 11 | |
| Etiquette | 2 | 5 | |
| Forgery | 3 | 10 | |
| Industrial Mechanic | 1 | 8 | |
| Industrial Mechanic | 1 | 8 | |
| Locksmith | 3 | 11 | |
| Longarms | 4 | 7 | |
| Nautical Mechanic | 1 | 8 | |
| Palming | 1 | 4 | |
| Palming | 1 | 4 | |
| Perception | 4 | 8 | |
| Pilot Ground Craft | 1 | 5 | |
| Pistols | 3 | 6 | |
| Sneaking | 1 | 4 | |
| Unarmed Combat | 2 | 5 | |
| Computer Science | 2 | 9 | |
| Economics | 2 | 9 | |
| Electronic Security | 3 | 10 | |
| Engineering | 3 | 10 | |
| Physical Security | 3 | 7 | |
| Physical Security | 3 | 10 | |
| Political Science | 2 | 9 | |
| Rumor | 2 | 6 | |
| Surviellence | 3 | 10 | |
| English | 2 | 6 | |
| German | 1 | 5 | |
| Japanese | 2 | 6 |
| Attribute | Rating |
|---|---|
| Body | 4 |
| Agility | 3 |
| Reaction | 4 |
| Strength | 3 |
| Willpower | 4 |
| Logic | 7 |
| Intuition | 4 |
| Charisma | 3 |
| Essence | 1.4 |
| Edge | 5 |
| Initiative | 8 |
| Simple Actions | Marks | Note | Test: Source | d6 |
| Change Icon | Owner | Change target icon, or self | ||
| Data Processing | Miscellaneous | |||
| Check Overwatch Score | - | Get OS from GM | Electronic Warfare [] + Logic [3] | [3d6] |
| Sleaze | Information Gathering | 6d6 | ||
| Invite Mark | Owner | Choose # of Marks and Duration | ||
| Data Processing | Mark Manipulation | |||
| Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [3] | [3d6] |
| Firewall | Miscellaneous | Logic + Attack | Transys Avalon [3d6] | |
| Send Message | - | Send short sentence, image, or file to user. | ||
| Data Processing | Miscellaneous | |||
| Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
| Data Processing | Miscellaneous | |||
| Complex Actions | Marks | Note | Test: Source | d6 |
| Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [3] | [3d6] |
| Sleaze | Device Manipulation | Willpower + Firewall | Transys Avalon [9d6] | |
| Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [3] | [3d6] |
| Data Processing | Device Manipulation | Willpower + Firewall | Transys Avalon [9d6] | |
| Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [3] | [3d6] |
| Sleaze | Device Manipulation | Logic + Firewall | Transys Avalon [9d6] | |
| Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [3] | [3d6] |
| Sleaze | Device Manipulation | Logic + Firewall | Transys Avalon [9d6] | |
| Crack File | 1 | Remove File Protection | Hacking [] + Logic [3] | [3d6] |
| Attack | File Manipulation | 2 * Protection Rating | ||
| Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [3] | [3d6] |
| Firewall | File Manipulation | 2 * Data Bomb Rating | ||
| Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [3] | [3d6] |
| Data Processing | File Manipulation | Intuition + Firewall | Transys Avalon [9d6] | |
| Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [3] | [3d6] |
| Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
| Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [3] | [3d6] |
| Data Processing | Information Gathering | Logic + Sleaze | Transys Avalon [3d6] | |
| Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [] + Intuition [3] | [3d6] |
| Sleaze | Information Gathering | Logic + Firewall | Transys Avalon [9d6] | |
| Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [3] | [3d6] |
| Data Processing | Information Gathering | Willpower + Sleaze | Transys Avalon [3d6] | |
| Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | Willpower + Firewall | Transys Avalon [9d6] | |
| Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
| Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | Willpower + Firewall | Transys Avalon [9d6] | |
| Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [3] | [3d6] |
| Sleaze | Mark Manipulation | Intuition + Firewall | Transys Avalon [9d6] | |
| Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [3] | [3d6] | |
| Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
| Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Matrix Combat | Intuition + Firewall | Transys Avalon [9d6] | |
| Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Matrix Combat | Intuition + Firewall | Transys Avalon [9d6] | |
| Enter / Exit host | 1 | Exit Host to where you entered from | ||
| Data Processing | Miscellaneous | |||
| Grid Hop | - | Mast have permission, must leave host first | ||
| Data Processing | Miscellaneous | |||
| Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [] + Intuition [3] | [3d6] |
| Sleaze | Miscellaneous | Intuition + Data Processing | Transys Avalon [9d6] | |
| Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [] + Logic [3] | [3d6] |
| Attack | Miscellaneous | |||
| Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [] + Logic [3] | [3d6] |
| Data Processing | Miscellaneous | Willpower + Firewall | Transys Avalon [9d6] |
| Katana Weapon Focus (3) [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Lined Coat [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Certified Credstick, Ebony [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 5 |
| Firewall | 5 |
| Certified Credstick, Silver [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 5 |
| Firewall | 5 |
| Facility, Armorer [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Transys Avalon [12] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 6 |
| Firewall | 6 |
| name | modified | dicepool | specialization |
|---|---|---|---|
| Armorer | 1 | 4 | |
| Blades | 6 | 11 | Swords +2 |
| Gymnastics | 3 | 8 | Leaping +2 |
| Pilot Ground Craft | 1 | 8 | |
| Pistols | 1 | 6 | |
| Running | 2 | 7 | |
| Sneaking | 3 | 8 | |
| Throwing Weapons | 1 | 6 | |
| Unarmed Combat | 4 | 9 | Karate +2 |
| Bushido | 5 | 8 | |
| Shinto | 1 | 4 | |
| English | 6 | 9 | |
| Japanese | 1 | 4 |
| Attribute | Rating |
|---|---|
| Body | 5 |
| Agility | 5 |
| Reaction | 7 |
| Strength | 5 |
| Willpower | 3 |
| Logic | 3 |
| Intuition | 3 |
| Charisma | 3 |
| Essence | 6 |
| Edge | 2 |
| Magic | 6 |
| Initiative | 10 |
| Simple Actions | Marks | Note | Test: Source | d6 |
| Change Icon | Owner | Change target icon, or self | ||
| Data Processing | Miscellaneous | |||
| Check Overwatch Score | - | Get OS from GM | Electronic Warfare [] + Logic [3] | [3d6] |
| Sleaze | Information Gathering | 6d6 | ||
| Invite Mark | Owner | Choose # of Marks and Duration | ||
| Data Processing | Mark Manipulation | |||
| Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [3] | [3d6] |
| Firewall | Miscellaneous | Logic + Attack | EvoTech Himitsu [3d6] | |
| Send Message | - | Send short sentence, image, or file to user. | ||
| Data Processing | Miscellaneous | |||
| Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
| Data Processing | Miscellaneous | |||
| Complex Actions | Marks | Note | Test: Source | d6 |
| Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [3] | [3d6] |
| Sleaze | Device Manipulation | Willpower + Firewall | EvoTech Himitsu [5d6] | |
| Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [3] | [3d6] |
| Data Processing | Device Manipulation | Willpower + Firewall | EvoTech Himitsu [5d6] | |
| Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [2] | [2d6] |
| Sleaze | Device Manipulation | Logic + Firewall | EvoTech Himitsu [5d6] | |
| Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [3] | [3d6] |
| Sleaze | Device Manipulation | Logic + Firewall | EvoTech Himitsu [5d6] | |
| Crack File | 1 | Remove File Protection | Hacking [] + Logic [3] | [3d6] |
| Attack | File Manipulation | 2 * Protection Rating | ||
| Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [2] | [2d6] |
| Firewall | File Manipulation | 2 * Data Bomb Rating | ||
| Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [3] | [3d6] |
| Data Processing | File Manipulation | Intuition + Firewall | EvoTech Himitsu [4d6] | |
| Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [3] | [3d6] |
| Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
| Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [2] | [2d6] |
| Data Processing | Information Gathering | Logic + Sleaze | EvoTech Himitsu [8d6] | |
| Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [] + Intuition [2] | [2d6] |
| Sleaze | Information Gathering | Logic + Firewall | EvoTech Himitsu [5d6] | |
| Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [2] | [2d6] |
| Data Processing | Information Gathering | Willpower + Sleaze | EvoTech Himitsu [8d6] | |
| Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | Willpower + Firewall | EvoTech Himitsu [5d6] | |
| Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
| Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | Willpower + Firewall | EvoTech Himitsu [5d6] | |
| Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [3] | [3d6] |
| Sleaze | Mark Manipulation | Intuition + Firewall | EvoTech Himitsu [4d6] | |
| Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [3] | [3d6] | |
| Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
| Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Matrix Combat | Intuition + Firewall | EvoTech Himitsu [4d6] | |
| Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Matrix Combat | Intuition + Firewall | EvoTech Himitsu [4d6] | |
| Enter / Exit host | 1 | Exit Host to where you entered from | ||
| Data Processing | Miscellaneous | |||
| Grid Hop | - | Mast have permission, must leave host first | ||
| Data Processing | Miscellaneous | |||
| Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [] + Intuition [2] | [2d6] |
| Sleaze | Miscellaneous | Intuition + Data Processing | EvoTech Himitsu [4d6] | |
| Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [] + Logic [3] | [3d6] |
| Attack | Miscellaneous | |||
| Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [] + Logic [3] | [3d6] |
| Data Processing | Miscellaneous | Willpower + Firewall | EvoTech Himitsu [5d6] |
| Cavalier Arms Urban Tribe Tomahawk [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Cavalier Arms Urban Tribe Tomahawk [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Cavalier Arms Urban Tribe Tomahawk [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Cavalier Arms Urban Tribe Tomahawk [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Cavalier Arms Urban Tribe Tomahawk (Melee) [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Cavalier Arms Urban Tribe Tomahawk (Melee) [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Cavalier Arms Urban Tribe Tomahawk (Melee) [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Cavalier Arms Urban Tribe Tomahawk (Melee) [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Combat Axe [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Armor Clothing [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Bone Lacing (Aluminum) [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Lined Coat [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| EvoTech Himitsu [4] | |
|---|---|
| Attack | 0 |
| Sleaze | 5 |
| Data Processing | 2 |
| Firewall | 2 |
| name | modified | dicepool | specialization |
|---|---|---|---|
| Blades | 6 | 12 | Axes +2 |
| Gunnery | 2 | 8 | |
| Intimidation | 2 | 5 | |
| Locksmith | 2 | 8 | |
| Perception | 2 | 4 | |
| Pilot Ground Craft | 1 | 7 | |
| Throwing Weapons | 6 | 12 | |
| Houston Gangs | 2 | 4 | |
| Houston Upper Class | 2 | 4 | |
| Serial Killing | 2 | 4 | |
| English | 1 | 3 | |
| Japanese | 2 | 4 | |
| Spanish | 2 | 4 |
| Attribute | Rating |
|---|---|
| Body | 10 |
| Agility | 6 |
| Reaction | 6 |
| Strength | 11 |
| Willpower | 3 |
| Logic | 3 |
| Intuition | 2 |
| Charisma | 1 |
| Essence | 1 |
| Edge | 6 |
| Initiative | 8 |
| Simple Actions | Marks | Note | Test: Source | d6 |
| Change Icon | Owner | Change target icon, or self | ||
| Data Processing | Miscellaneous | |||
| Check Overwatch Score | - | Get OS from GM | Electronic Warfare [] + Logic [3] | [3d6] |
| Sleaze | Information Gathering | 6d6 | ||
| Invite Mark | Owner | Choose # of Marks and Duration | ||
| Data Processing | Mark Manipulation | |||
| Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [5] | [5d6] |
| Firewall | Miscellaneous | Logic + Attack | Common Denominator Element [3d6] | |
| Send Message | - | Send short sentence, image, or file to user. | ||
| Data Processing | Miscellaneous | |||
| Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
| Data Processing | Miscellaneous | |||
| Complex Actions | Marks | Note | Test: Source | d6 |
| Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [3] | [3d6] |
| Sleaze | Device Manipulation | Willpower + Firewall | Common Denominator Element [7d6] | |
| Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [3] | [3d6] |
| Data Processing | Device Manipulation | Willpower + Firewall | Common Denominator Element [7d6] | |
| Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [10] | [10d6] |
| Sleaze | Device Manipulation | Logic + Firewall | Common Denominator Element [5d6] | |
| Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [3] | [3d6] |
| Sleaze | Device Manipulation | Logic + Firewall | Common Denominator Element [5d6] | |
| Crack File | 1 | Remove File Protection | Hacking [] + Logic [3] | [3d6] |
| Attack | File Manipulation | 2 * Protection Rating | ||
| Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [10] | [10d6] |
| Firewall | File Manipulation | 2 * Data Bomb Rating | ||
| Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [3] | [3d6] |
| Data Processing | File Manipulation | Intuition + Firewall | Common Denominator Element [12d6] | |
| Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [3] | [3d6] |
| Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
| Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [10] | [10d6] |
| Data Processing | Information Gathering | Logic + Sleaze | Common Denominator Element [3d6] | |
| Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [] + Intuition [10] | [10d6] |
| Sleaze | Information Gathering | Logic + Firewall | Common Denominator Element [5d6] | |
| Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [10] | [10d6] |
| Data Processing | Information Gathering | Willpower + Sleaze | Common Denominator Element [5d6] | |
| Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | Willpower + Firewall | Common Denominator Element [7d6] | |
| Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
| Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | Willpower + Firewall | Common Denominator Element [7d6] | |
| Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [3] | [3d6] |
| Sleaze | Mark Manipulation | Intuition + Firewall | Common Denominator Element [12d6] | |
| Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [3] | [3d6] | |
| Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
| Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Matrix Combat | Intuition + Firewall | Common Denominator Element [12d6] | |
| Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Matrix Combat | Intuition + Firewall | Common Denominator Element [12d6] | |
| Enter / Exit host | 1 | Exit Host to where you entered from | ||
| Data Processing | Miscellaneous | |||
| Grid Hop | - | Mast have permission, must leave host first | ||
| Data Processing | Miscellaneous | |||
| Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [] + Intuition [10] | [10d6] |
| Sleaze | Miscellaneous | Intuition + Data Processing | Common Denominator Element [12d6] | |
| Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [] + Logic [3] | [3d6] |
| Attack | Miscellaneous | |||
| Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [] + Logic [3] | [3d6] |
| Data Processing | Miscellaneous | Willpower + Firewall | Common Denominator Element [7d6] |
| Knucks [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Shock Glove [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Chameleon Suit [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Binoculars, Optical [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Common Denominator Element [4] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Ebony Cred Card $4476 [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 5 |
| Firewall | 5 |
| Galveston casino chips [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Magical Lodge Materials [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Reagents, Raw (dram) [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Sustaining Focus [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Sustaining Focus [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| name | modified | dicepool | specialization |
|---|---|---|---|
| Outdoors Group | 2 | ||
| Assensing | 4 | 14 | |
| Binding | 6 | 12 | Guardian Spirits +2 |
| Flight | 3 | 9 | |
| Navigation | 2 | 12 | |
| Perception | 4 | 15 | Visual +2 |
| Sneaking | 3 | 9 | |
| Spellcasting | 5 | 11 | |
| Summoning | 6 | 12 | Guardian Spirits +2 |
| Survival | 2 | 7 | |
| Tracking | 2 | 12 | |
| Unarmed Combat | 5 | 11 | |
| Magical Security | 6 | 9 | |
| Paranormal Animals | 6 | 9 | |
| Physical Security | 6 | 9 | |
| English | 1 | 11 |
| Attribute | Rating |
|---|---|
| Body | 4 |
| Agility | 6 |
| Reaction | 5 |
| Strength | 6 |
| Willpower | 5 |
| Logic | 3 |
| Intuition | 10 |
| Charisma | 4 |
| Essence | 6 |
| Edge | 3 |
| Magic | 6 |
| Initiate Grade | 1 |
| Initiative | 17 |
| Simple Actions | Marks | Note | Test: Source | d6 |
| Change Icon | Owner | Change target icon, or self | ||
| Data Processing | Miscellaneous | |||
| Check Overwatch Score | - | Get OS from GM | Electronic Warfare [] + Logic [3] | [3d6] |
| Sleaze | Information Gathering | 6d6 | ||
| Invite Mark | Owner | Choose # of Marks and Duration | ||
| Data Processing | Mark Manipulation | |||
| Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [5] | [5d6] |
| Firewall | Miscellaneous | Logic + Attack | ||
| Send Message | - | Send short sentence, image, or file to user. | ||
| Data Processing | Miscellaneous | |||
| Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
| Data Processing | Miscellaneous | |||
| Complex Actions | Marks | Note | Test: Source | d6 |
| Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [3] | [3d6] |
| Sleaze | Device Manipulation | Willpower + Firewall | ||
| Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [3] | [3d6] |
| Data Processing | Device Manipulation | Willpower + Firewall | ||
| Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [6] | [6d6] |
| Sleaze | Device Manipulation | Logic + Firewall | ||
| Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [3] | [3d6] |
| Sleaze | Device Manipulation | Logic + Firewall | ||
| Crack File | 1 | Remove File Protection | Hacking [] + Logic [3] | [3d6] |
| Attack | File Manipulation | 2 * Protection Rating | ||
| Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [6] | [6d6] |
| Firewall | File Manipulation | 2 * Data Bomb Rating | ||
| Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [3] | [3d6] |
| Data Processing | File Manipulation | Intuition + Firewall | ||
| Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [3] | [3d6] |
| Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
| Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [6] | [6d6] |
| Data Processing | Information Gathering | Logic + Sleaze | ||
| Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [] + Intuition [6] | [6d6] |
| Sleaze | Information Gathering | Logic + Firewall | ||
| Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [6] | [6d6] |
| Data Processing | Information Gathering | Willpower + Sleaze | ||
| Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | Willpower + Firewall | ||
| Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
| Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | Willpower + Firewall | ||
| Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [3] | [3d6] |
| Sleaze | Mark Manipulation | Intuition + Firewall | ||
| Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [3] | [3d6] | |
| Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
| Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Matrix Combat | Intuition + Firewall | ||
| Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Matrix Combat | Intuition + Firewall | ||
| Enter / Exit host | 1 | Exit Host to where you entered from | ||
| Data Processing | Miscellaneous | |||
| Grid Hop | - | Mast have permission, must leave host first | ||
| Data Processing | Miscellaneous | |||
| Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [] + Intuition [6] | [6d6] |
| Sleaze | Miscellaneous | Intuition + Data Processing | ||
| Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [] + Logic [3] | [3d6] |
| Attack | Miscellaneous | |||
| Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [] + Logic [3] | [3d6] |
| Data Processing | Miscellaneous | Willpower + Firewall |
| name | modified | dicepool | specialization |
|---|---|---|---|
| Perception | 4 | 10 | |
| Running | 5 | 13 | |
| Sneaking | 4 | 9 | |
| Tracking | 4 | 10 | |
| Unarmed Combat | 7 | 12 |
| Attribute | Rating |
|---|---|
| Body | 9 |
| Agility | 5 |
| Reaction | 4 |
| Strength | 8 |
| Willpower | 5 |
| Logic | 3 |
| Intuition | 6 |
| Charisma | 3 |
| Essence | 6 |
| Edge | 3 |
| Initiative | 10 |
| Simple Actions | Marks | Note | Test: Source | d6 |
| Change Icon | Owner | Change target icon, or self | ||
| Data Processing | Miscellaneous | |||
| Check Overwatch Score | - | Get OS from GM | Electronic Warfare [] + Logic [3] | [3d6] |
| Sleaze | Information Gathering | 6d6 | ||
| Invite Mark | Owner | Choose # of Marks and Duration | ||
| Data Processing | Mark Manipulation | |||
| Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [5] | [5d6] |
| Firewall | Miscellaneous | Logic + Attack | Ear buds [3d6] Micro-Tranceiver [3d6] Renraku Sensei [3d6] | |
| Send Message | - | Send short sentence, image, or file to user. | ||
| Data Processing | Miscellaneous | |||
| Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
| Data Processing | Miscellaneous | |||
| Complex Actions | Marks | Note | Test: Source | d6 |
| Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [3] | [3d6] |
| Sleaze | Device Manipulation | Willpower + Firewall | Ear buds [7d6] Micro-Tranceiver [7d6] Renraku Sensei [8d6] | |
| Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [3] | [3d6] |
| Data Processing | Device Manipulation | Willpower + Firewall | Ear buds [7d6] Micro-Tranceiver [7d6] Renraku Sensei [8d6] | |
| Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [3] | [3d6] |
| Sleaze | Device Manipulation | Logic + Firewall | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
| Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [3] | [3d6] |
| Sleaze | Device Manipulation | Logic + Firewall | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
| Crack File | 1 | Remove File Protection | Hacking [] + Logic [3] | [3d6] |
| Attack | File Manipulation | 2 * Protection Rating | ||
| Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [3] | [3d6] |
| Firewall | File Manipulation | 2 * Data Bomb Rating | ||
| Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [3] | [3d6] |
| Data Processing | File Manipulation | Intuition + Firewall | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
| Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [3] | [3d6] |
| Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
| Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [3] | [3d6] |
| Data Processing | Information Gathering | Logic + Sleaze | Ear buds [3d6] Micro-Tranceiver [3d6] Renraku Sensei [3d6] | |
| Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [] + Intuition [3] | [3d6] |
| Sleaze | Information Gathering | Logic + Firewall | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
| Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [3] | [3d6] |
| Data Processing | Information Gathering | Willpower + Sleaze | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [5d6] | |
| Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | Willpower + Firewall | Ear buds [7d6] Micro-Tranceiver [7d6] Renraku Sensei [8d6] | |
| Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
| Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [3] | [3d6] |
| Attack | Mark Manipulation | Willpower + Firewall | Ear buds [7d6] Micro-Tranceiver [7d6] Renraku Sensei [8d6] | |
| Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [3] | [3d6] |
| Sleaze | Mark Manipulation | Intuition + Firewall | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
| Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [3] | [3d6] | |
| Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
| Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Matrix Combat | Intuition + Firewall | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
| Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [3] | [3d6] |
| Attack | Matrix Combat | Intuition + Firewall | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
| Enter / Exit host | 1 | Exit Host to where you entered from | ||
| Data Processing | Miscellaneous | |||
| Grid Hop | - | Mast have permission, must leave host first | ||
| Data Processing | Miscellaneous | |||
| Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [] + Intuition [3] | [3d6] |
| Sleaze | Miscellaneous | Intuition + Data Processing | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
| Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [] + Logic [3] | [3d6] |
| Attack | Miscellaneous | |||
| Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [] + Logic [3] | [3d6] |
| Data Processing | Miscellaneous | Willpower + Firewall | Ear buds [7d6] Micro-Tranceiver [7d6] Renraku Sensei [8d6] |
| Ares "One" Monosword [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Ares Light Fire 70 [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Ares Predator V [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Knife [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Armor Vest [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Ballistic Mask (Customized) [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Lined Coat [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Certified Credstick, Silver [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 5 |
| Firewall | 5 |
| Concealable Holster [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Ear buds [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Flashlight [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Glasses [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Magical Lodge Materials [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Medkit [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Metal Restraints [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Micro-Tranceiver [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Quick-Draw Holster [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Renraku Sensei [6] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 3 |
| Firewall | 3 |
| Survival Kit [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| name | modified | dicepool | specialization |
|---|---|---|---|
| Conjuring Group | 2 | ||
| Alchemy | 3 | 9 | |
| Arcana | 4 | 7 | |
| Artificing | 2 | 8 | |
| Assensing | 4 | 7 | |
| Astral Combat | 3 | 8 | |
| Banishing | 2 | 8 | |
| Binding | 2 | 8 | |
| Blades | 5 | 8 | |
| Counterspelling | 5 | 11 | |
| Intimidation | 1 | 8 | |
| Perception | 2 | 5 | |
| Pistols | 2 | 5 | |
| Spellcasting | 6 | 12 | |
| Summoning | 2 | 8 | |
| Unarmed Combat | 2 | 5 | |
| 20th Century Horror Movies | 2 | 5 | |
| Business Finance | 2 | 5 | |
| Gang Identification | 2 | 5 | |
| Parazoology | 2 | 5 | |
| Psycology | 2 | 5 | |
| Russian Mythology | 3 | 6 | |
| English | 1 | 4 | |
| German | 1 | 4 | |
| Latin | 1 | 4 | |
| Russian | 1 | 4 |
| Attribute | Rating |
|---|---|
| Body | 3 |
| Agility | 3 |
| Reaction | 4 |
| Strength | 3 |
| Willpower | 5 |
| Logic | 3 |
| Intuition | 3 |
| Charisma | 5 |
| Essence | 6 |
| Edge | 3 |
| Magic | 6 |
| Initiate Grade | 1 |
| Initiative | 7 |
| Simple Actions | Marks | Note | Test: Source | d6 |
| Change Icon | Owner | Change target icon, or self | ||
| Data Processing | Miscellaneous | |||
| Check Overwatch Score | - | Get OS from GM | Electronic Warfare [3] + Logic [5] | [8d6] |
| Sleaze | Information Gathering | 6d6 | ||
| Invite Mark | Owner | Choose # of Marks and Duration | ||
| Data Processing | Mark Manipulation | |||
| Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [2] + Willpower [5] | [7d6] |
| Firewall | Miscellaneous | Logic + Attack | Living Persona [9d6] Meta Link (Decoy) [5d6] Meta Link (Family) [5d6] Meta Link (Reality Hackers) [5d6] Microdeck Summit [6d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] | |
| Send Message | - | Send short sentence, image, or file to user. | ||
| Data Processing | Miscellaneous | |||
| Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
| Data Processing | Miscellaneous | |||
| Complex Actions | Marks | Note | Test: Source | d6 |
| Format Device | 3 | Device is Formatted on next Reboot | Computer [4] + Logic [5] | [9d6] |
| Sleaze | Device Manipulation | Willpower + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] | |
| Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [4] + Logic [5] | [9d6] |
| Data Processing | Device Manipulation | Willpower + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] | |
| Spoof Command | 1 | Send command as though Owner | Hacking [5] + Intuition [6] | [11d6] |
| Sleaze | Device Manipulation | Logic + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] | |
| Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [5] + Logic [5] | [10d6] |
| Sleaze | Device Manipulation | Logic + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] | |
| Crack File | 1 | Remove File Protection | Hacking [5] + Logic [5] | [10d6] |
| Attack | File Manipulation | 2 * Protection Rating | ||
| Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [5] + Intuition [6] | [11d6] |
| Firewall | File Manipulation | 2 * Data Bomb Rating | ||
| Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [4] + Logic [5] | [9d6] |
| Data Processing | File Manipulation | Intuition + Firewall | Living Persona [11d6] Meta Link (Decoy) [7d6] Meta Link (Family) [7d6] Meta Link (Reality Hackers) [7d6] Microdeck Summit [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] | |
| Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [5] + Logic [5] | [10d6] |
| Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
| Matrix Perception | - | Opposed if target is running silent | Computer [4] + Inuition [6] | [10d6] |
| Data Processing | Information Gathering | Logic + Sleaze | Living Persona [11d6] Meta Link (Decoy) [5d6] Meta Link (Family) [5d6] Meta Link (Reality Hackers) [5d6] Microdeck Summit [9d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] | |
| Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [3] + Intuition [6] | [9d6] |
| Sleaze | Information Gathering | Logic + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] | |
| Trace Icon | 2 | Locate Physical Location of device/persona | Computer [4] + Intuition [6] | [10d6] |
| Data Processing | Information Gathering | Willpower + Sleaze | Living Persona [11d6] Meta Link (Decoy) [5d6] Meta Link (Family) [5d6] Meta Link (Reality Hackers) [5d6] Microdeck Summit [9d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] | |
| Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [4] + Logic [5] | [9d6] |
| Attack | Mark Manipulation | Willpower + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] | |
| Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [4] + Logic [5] | [9d6] |
| Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
| Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [4] + Logic [5] | [9d6] |
| Attack | Mark Manipulation | Willpower + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] | |
| Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [5] + Logic [5] | [10d6] |
| Sleaze | Mark Manipulation | Intuition + Firewall | Living Persona [11d6] Meta Link (Decoy) [7d6] Meta Link (Family) [7d6] Meta Link (Reality Hackers) [7d6] Microdeck Summit [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] | |
| Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [5] + Logic [5] | [10d6] | |
| Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
| Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [4] + Logic [5] | [9d6] |
| Attack | Matrix Combat | Intuition + Firewall | Living Persona [11d6] Meta Link (Decoy) [7d6] Meta Link (Family) [7d6] Meta Link (Reality Hackers) [7d6] Microdeck Summit [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] | |
| Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [4] + Logic [5] | [9d6] |
| Attack | Matrix Combat | Intuition + Firewall | Living Persona [11d6] Meta Link (Decoy) [7d6] Meta Link (Family) [7d6] Meta Link (Reality Hackers) [7d6] Microdeck Summit [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] | |
| Enter / Exit host | 1 | Exit Host to where you entered from | ||
| Data Processing | Miscellaneous | |||
| Grid Hop | - | Mast have permission, must leave host first | ||
| Data Processing | Miscellaneous | |||
| Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [3] + Intuition [6] | [9d6] |
| Sleaze | Miscellaneous | Intuition + Data Processing | Living Persona [11d6] Meta Link (Decoy) [7d6] Meta Link (Family) [7d6] Meta Link (Reality Hackers) [7d6] Microdeck Summit [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] | |
| Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [3] + Logic [5] | [8d6] |
| Attack | Miscellaneous | |||
| Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [3] + Logic [5] | [8d6] |
| Data Processing | Miscellaneous | Willpower + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] |
| Ares Light Fire 75 [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Flash-Pak Grenade [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Stun Dongle [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Survival Knife [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Ace of Cups [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Black Biker Gloves [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Chameleon Suit [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Doc Martens 1914 Smoothes [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Fancy T-Shirt [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Go Ganger Outfit [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Respirator [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Swimmers Cap [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Asylum [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Beltpouch [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Bug Scanner [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Data Tap [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Datachip [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 1 |
| Firewall | 1 |
| Electronic Paper [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 1 |
| Firewall | 1 |
| Electronic Parts [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Endoscope [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Goggles [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Hidden Gun Arm Slide [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Key/Combination Lock [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Long Haul [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Meta Link (Decoy) [2] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 1 |
| Firewall | 1 |
| Meta Link (Family) [2] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 1 |
| Firewall | 1 |
| Meta Link (Reality Hackers) [2] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 1 |
| Firewall | 1 |
| Microdeck Summit [6] | |
|---|---|
| Attack | 1 |
| Sleaze | 4 |
| Data Processing | 3 |
| Firewall | 3 |
| Myomeric Rope (m) [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Nausea Gas [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Renraku Sensei [6] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 3 |
| Firewall | 3 |
| Renraku Sensei [6] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 3 |
| Firewall | 3 |
| Renraku Sensei [6] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 3 |
| Firewall | 3 |
| Renraku Sensei [6] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 3 |
| Firewall | 3 |
| Renraku Sensei [6] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 3 |
| Firewall | 3 |
| Renraku Sensei [6] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 3 |
| Firewall | 3 |
| Sensor Tags [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Sensor Tags [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Sensor Tags [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Stim Patch [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Tool Kit, Hardware [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 2 |
| Firewall | 2 |
| Trodes [] | |
|---|---|
| Attack | 0 |
| Sleaze | 0 |
| Data Processing | 3 |
| Firewall | 3 |
| name | modified | dicepool | specialization |
|---|---|---|---|
| Compiling | 5 | 11 | Machine Sprites +2 |
| Computer | 4 | 9 | |
| Cybercombat | 4 | 9 | |
| Electronic Warfare | 3 | 8 | Communications +2 |
| Hacking | 5 | 10 | vs. Personas +2 |
| Hardware | 2 | 7 | Cyberdecks +2 |
| Perception | 2 | 8 | |
| Pistols | 1 | 3 | Semi-Automatics +2 |
| Registering | 5 | 11 | |
| Software | 5 | 10 | Cleaner +2 |
| Corporate Security | 4 | 9 | |
| Security Design | 5 | 10 | Matrix +2, Electronic +2 |
| Chinese | 1 | 7 | |
| English | 1 | 7 | |
| Japanese | 4 | 10 | Speak +2 |
| Latin | 2 | 8 | |
| Spanish | 3 | 9 |
| Attribute | Rating |
|---|---|
| Body | 2 |
| Agility | 2 |
| Reaction | 3 |
| Strength | 1 |
| Willpower | 5 |
| Logic | 5 |
| Intuition | 6 |
| Charisma | 4 |
| Essence | 6 |
| Edge | 4 |
| Resonance | 6 |
| Submersion Grade | 1 |
| Initiative | 9 |