Simple Actions | Marks | Note | Test: Source | d6 |
Change Icon | Owner | Change target icon, or self | ||
Data Processing | Miscellaneous | |||
Check Overwatch Score | - | Get OS from GM | Electronic Warfare [] + Logic [3] | [3d6] |
Sleaze | Information Gathering | 6d6 | ||
Invite Mark | Owner | Choose # of Marks and Duration | ||
Data Processing | Mark Manipulation | |||
Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [5] | [5d6] |
Firewall | Miscellaneous | Logic + Attack | ||
Send Message | - | Send short sentence, image, or file to user. | ||
Data Processing | Miscellaneous | |||
Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
Data Processing | Miscellaneous | |||
Complex Actions | Marks | Note | Test: Source | d6 |
Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [3] | [3d6] |
Sleaze | Device Manipulation | Willpower + Firewall | ||
Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [3] | [3d6] |
Data Processing | Device Manipulation | Willpower + Firewall | ||
Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [6] | [6d6] |
Sleaze | Device Manipulation | Logic + Firewall | ||
Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [3] | [3d6] |
Sleaze | Device Manipulation | Logic + Firewall | ||
Crack File | 1 | Remove File Protection | Hacking [] + Logic [3] | [3d6] |
Attack | File Manipulation | 2 * Protection Rating | ||
Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [6] | [6d6] |
Firewall | File Manipulation | 2 * Data Bomb Rating | ||
Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [3] | [3d6] |
Data Processing | File Manipulation | Intuition + Firewall | ||
Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [3] | [3d6] |
Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [6] | [6d6] |
Data Processing | Information Gathering | Logic + Sleaze | ||
Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [] + Intuition [6] | [6d6] |
Sleaze | Information Gathering | Logic + Firewall | ||
Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [6] | [6d6] |
Data Processing | Information Gathering | Willpower + Sleaze | ||
Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | Willpower + Firewall | ||
Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | Willpower + Firewall | ||
Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [3] | [3d6] |
Sleaze | Mark Manipulation | Intuition + Firewall | ||
Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [3] | [3d6] | |
Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [3] | [3d6] |
Attack | Matrix Combat | Intuition + Firewall | ||
Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [3] | [3d6] |
Attack | Matrix Combat | Intuition + Firewall | ||
Enter / Exit host | 1 | Exit Host to where you entered from | ||
Data Processing | Miscellaneous | |||
Grid Hop | - | Mast have permission, must leave host first | ||
Data Processing | Miscellaneous | |||
Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [] + Intuition [6] | [6d6] |
Sleaze | Miscellaneous | Intuition + Data Processing | ||
Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [] + Logic [3] | [3d6] |
Attack | Miscellaneous | |||
Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [] + Logic [3] | [3d6] |
Data Processing | Miscellaneous | Willpower + Firewall |
name | modified | dicepool | specialization |
---|---|---|---|
Outdoors Group | 2 | ||
Flight | 4 | 7 | |
Navigation | 2 | 8 | |
Perception | 4 | 10 | |
Sneaking | 3 | 6 | |
Survival | 2 | 7 | |
Tracking | 4 | 10 | |
Tracking | 2 | 8 | |
Unarmed Combat | 5 | 8 |
Attribute | Rating |
---|---|
Body | 4 |
Agility | 3 |
Reaction | 3 |
Strength | 4 |
Willpower | 5 |
Logic | 3 |
Intuition | 6 |
Charisma | 3 |
Essence | 6 |
Edge | 3 |
Initiative | 9 |
Simple Actions | Marks | Note | Test: Source | d6 |
Change Icon | Owner | Change target icon, or self | ||
Data Processing | Miscellaneous | |||
Check Overwatch Score | - | Get OS from GM | Electronic Warfare [] + Logic [4] | [4d6] |
Sleaze | Information Gathering | 6d6 | ||
Invite Mark | Owner | Choose # of Marks and Duration | ||
Data Processing | Mark Manipulation | |||
Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [4] | [4d6] |
Firewall | Miscellaneous | Logic + Attack | Hermes Ikon [4d6] | |
Send Message | - | Send short sentence, image, or file to user. | ||
Data Processing | Miscellaneous | |||
Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
Data Processing | Miscellaneous | |||
Complex Actions | Marks | Note | Test: Source | d6 |
Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [4] | [4d6] |
Sleaze | Device Manipulation | Willpower + Firewall | Hermes Ikon [9d6] | |
Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [4] | [4d6] |
Data Processing | Device Manipulation | Willpower + Firewall | Hermes Ikon [9d6] | |
Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [4] | [4d6] |
Sleaze | Device Manipulation | Logic + Firewall | Hermes Ikon [9d6] | |
Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [4] | [4d6] |
Sleaze | Device Manipulation | Logic + Firewall | Hermes Ikon [9d6] | |
Crack File | 1 | Remove File Protection | Hacking [] + Logic [4] | [4d6] |
Attack | File Manipulation | 2 * Protection Rating | ||
Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [4] | [4d6] |
Firewall | File Manipulation | 2 * Data Bomb Rating | ||
Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [4] | [4d6] |
Data Processing | File Manipulation | Intuition + Firewall | Hermes Ikon [9d6] | |
Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [4] | [4d6] |
Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [4] | [4d6] |
Data Processing | Information Gathering | Logic + Sleaze | Hermes Ikon [4d6] | |
Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [] + Intuition [4] | [4d6] |
Sleaze | Information Gathering | Logic + Firewall | Hermes Ikon [9d6] | |
Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [4] | [4d6] |
Data Processing | Information Gathering | Willpower + Sleaze | Hermes Ikon [4d6] | |
Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [4] | [4d6] |
Attack | Mark Manipulation | Willpower + Firewall | Hermes Ikon [9d6] | |
Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [4] | [4d6] |
Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [4] | [4d6] |
Attack | Mark Manipulation | Willpower + Firewall | Hermes Ikon [9d6] | |
Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [4] | [4d6] |
Sleaze | Mark Manipulation | Intuition + Firewall | Hermes Ikon [9d6] | |
Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [4] | [4d6] | |
Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [4] | [4d6] |
Attack | Matrix Combat | Intuition + Firewall | Hermes Ikon [9d6] | |
Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [4] | [4d6] |
Attack | Matrix Combat | Intuition + Firewall | Hermes Ikon [9d6] | |
Enter / Exit host | 1 | Exit Host to where you entered from | ||
Data Processing | Miscellaneous | |||
Grid Hop | - | Mast have permission, must leave host first | ||
Data Processing | Miscellaneous | |||
Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [] + Intuition [4] | [4d6] |
Sleaze | Miscellaneous | Intuition + Data Processing | Hermes Ikon [9d6] | |
Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [] + Logic [4] | [4d6] |
Attack | Miscellaneous | |||
Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [] + Logic [4] | [4d6] |
Data Processing | Miscellaneous | Willpower + Firewall | Hermes Ikon [9d6] |
Ruger Super Warhawk [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Armor Clothing [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Certified Credstick, Gold [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 5 |
Firewall | 5 |
Hermes Ikon [10] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 5 |
Firewall | 5 |
Magical Lodge Materials [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Sustaining Focus [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
name | modified | dicepool | specialization |
---|---|---|---|
Assensing | 1 | 5 | |
Banishing | 1 | 7 | |
Binding | 2 | 8 | |
Con | 2 | 6 | |
Counterspelling | 2 | 8 | |
Etiquette | 2 | 6 | |
Negotiation | 1 | 5 | |
Perception | 1 | 5 | |
Pistols | 6 | 11 | Revolvers +2 |
Ritual Spellcasting | 2 | 8 | |
Sneaking | 1 | 6 | |
Spellcasting | 3 | 9 | |
Summoning | 2 | 8 | |
4th World History | 4 | 8 | |
Legendary Runners | 3 | 7 | |
English | 6 | 10 | |
Japanese | 3 | 7 | |
Sperethiel | 1 | 5 |
Attribute | Rating |
---|---|
Body | 2 |
Agility | 5 |
Reaction | 3 |
Strength | 2 |
Willpower | 4 |
Logic | 4 |
Intuition | 4 |
Charisma | 4 |
Essence | 6 |
Edge | 8 |
Magic | 6 |
Initiate Grade | 1 |
Initiative | 7 |
Simple Actions | Marks | Note | Test: Source | d6 |
Change Icon | Owner | Change target icon, or self | ||
Data Processing | Miscellaneous | |||
Check Overwatch Score | - | Get OS from GM | Electronic Warfare [4] + Logic [7] | [11d6] |
Sleaze | Information Gathering | 6d6 | ||
Invite Mark | Owner | Choose # of Marks and Duration | ||
Data Processing | Mark Manipulation | |||
Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [4] | [4d6] |
Firewall | Miscellaneous | Logic + Attack | ||
Send Message | - | Send short sentence, image, or file to user. | ||
Data Processing | Miscellaneous | |||
Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
Data Processing | Miscellaneous | |||
Complex Actions | Marks | Note | Test: Source | d6 |
Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [7] | [7d6] |
Sleaze | Device Manipulation | Willpower + Firewall | ||
Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [7] | [7d6] |
Data Processing | Device Manipulation | Willpower + Firewall | ||
Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [4] | [4d6] |
Sleaze | Device Manipulation | Logic + Firewall | ||
Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [7] | [7d6] |
Sleaze | Device Manipulation | Logic + Firewall | ||
Crack File | 1 | Remove File Protection | Hacking [] + Logic [7] | [7d6] |
Attack | File Manipulation | 2 * Protection Rating | ||
Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [4] | [4d6] |
Firewall | File Manipulation | 2 * Data Bomb Rating | ||
Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [7] | [7d6] |
Data Processing | File Manipulation | Intuition + Firewall | ||
Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [7] | [7d6] |
Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [4] | [4d6] |
Data Processing | Information Gathering | Logic + Sleaze | ||
Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [4] + Intuition [4] | [8d6] |
Sleaze | Information Gathering | Logic + Firewall | ||
Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [4] | [4d6] |
Data Processing | Information Gathering | Willpower + Sleaze | ||
Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [7] | [7d6] |
Attack | Mark Manipulation | Willpower + Firewall | ||
Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [7] | [7d6] |
Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [7] | [7d6] |
Attack | Mark Manipulation | Willpower + Firewall | ||
Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [7] | [7d6] |
Sleaze | Mark Manipulation | Intuition + Firewall | ||
Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [7] | [7d6] | |
Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [7] | [7d6] |
Attack | Matrix Combat | Intuition + Firewall | ||
Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [7] | [7d6] |
Attack | Matrix Combat | Intuition + Firewall | ||
Enter / Exit host | 1 | Exit Host to where you entered from | ||
Data Processing | Miscellaneous | |||
Grid Hop | - | Mast have permission, must leave host first | ||
Data Processing | Miscellaneous | |||
Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [4] + Intuition [4] | [8d6] |
Sleaze | Miscellaneous | Intuition + Data Processing | ||
Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [4] + Logic [7] | [11d6] |
Attack | Miscellaneous | |||
Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [4] + Logic [7] | [11d6] |
Data Processing | Miscellaneous | Willpower + Firewall |
Ares Light Fire 75 [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Colt Government 2066 [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Colt Inception [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Combat Knife [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Defiance EX Shocker [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Enfield AS-7 [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Sapphire Knife [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Throwing Knife [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Underbarrel Grenade Launcher [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Bone Lacing (Aluminum) [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Executive Suite [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Industrious [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Riot Control Armor [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Autopicker [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Concealable Holster [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Concealable Holster [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Magecuff [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Metal Restraints [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Plasteel Restraints [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Shop, Locksmithing [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Smart Wig [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Smart Wig (w/ Trode Net) [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Synthskin Face Mask [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Synthskin Face Mask [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Tool Kit, Hand Loading [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Tool Kit, Locksmithing [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
name | modified | dicepool | specialization |
---|---|---|---|
Engineering Group | 1 | ||
Stealth Group | 1 | ||
Aeronautics Mechanic | 1 | 8 | |
Automotive Mechanic | 1 | 8 | |
Blades | 5 | 8 | |
Disguise | 1 | 5 | |
Electronic Warfare | 4 | 11 | |
Etiquette | 2 | 5 | |
Forgery | 3 | 10 | |
Industrial Mechanic | 1 | 8 | |
Industrial Mechanic | 1 | 8 | |
Locksmith | 3 | 11 | |
Longarms | 4 | 7 | |
Nautical Mechanic | 1 | 8 | |
Palming | 1 | 4 | |
Palming | 1 | 4 | |
Perception | 4 | 8 | |
Pilot Ground Craft | 1 | 5 | |
Pistols | 3 | 6 | |
Sneaking | 1 | 4 | |
Unarmed Combat | 2 | 5 | |
Computer Science | 2 | 9 | |
Economics | 2 | 9 | |
Electronic Security | 3 | 10 | |
Engineering | 3 | 10 | |
Physical Security | 3 | 7 | |
Physical Security | 3 | 10 | |
Political Science | 2 | 9 | |
Rumor | 2 | 6 | |
Surviellence | 3 | 10 | |
English | 2 | 6 | |
German | 1 | 5 | |
Japanese | 2 | 6 |
Attribute | Rating |
---|---|
Body | 4 |
Agility | 3 |
Reaction | 4 |
Strength | 3 |
Willpower | 4 |
Logic | 7 |
Intuition | 4 |
Charisma | 3 |
Essence | 1.4 |
Edge | 5 |
Initiative | 8 |
Simple Actions | Marks | Note | Test: Source | d6 |
Change Icon | Owner | Change target icon, or self | ||
Data Processing | Miscellaneous | |||
Check Overwatch Score | - | Get OS from GM | Electronic Warfare [] + Logic [3] | [3d6] |
Sleaze | Information Gathering | 6d6 | ||
Invite Mark | Owner | Choose # of Marks and Duration | ||
Data Processing | Mark Manipulation | |||
Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [3] | [3d6] |
Firewall | Miscellaneous | Logic + Attack | Transys Avalon [3d6] | |
Send Message | - | Send short sentence, image, or file to user. | ||
Data Processing | Miscellaneous | |||
Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
Data Processing | Miscellaneous | |||
Complex Actions | Marks | Note | Test: Source | d6 |
Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [3] | [3d6] |
Sleaze | Device Manipulation | Willpower + Firewall | Transys Avalon [9d6] | |
Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [3] | [3d6] |
Data Processing | Device Manipulation | Willpower + Firewall | Transys Avalon [9d6] | |
Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [3] | [3d6] |
Sleaze | Device Manipulation | Logic + Firewall | Transys Avalon [9d6] | |
Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [3] | [3d6] |
Sleaze | Device Manipulation | Logic + Firewall | Transys Avalon [9d6] | |
Crack File | 1 | Remove File Protection | Hacking [] + Logic [3] | [3d6] |
Attack | File Manipulation | 2 * Protection Rating | ||
Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [3] | [3d6] |
Firewall | File Manipulation | 2 * Data Bomb Rating | ||
Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [3] | [3d6] |
Data Processing | File Manipulation | Intuition + Firewall | Transys Avalon [9d6] | |
Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [3] | [3d6] |
Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [3] | [3d6] |
Data Processing | Information Gathering | Logic + Sleaze | Transys Avalon [3d6] | |
Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [] + Intuition [3] | [3d6] |
Sleaze | Information Gathering | Logic + Firewall | Transys Avalon [9d6] | |
Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [3] | [3d6] |
Data Processing | Information Gathering | Willpower + Sleaze | Transys Avalon [3d6] | |
Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | Willpower + Firewall | Transys Avalon [9d6] | |
Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | Willpower + Firewall | Transys Avalon [9d6] | |
Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [3] | [3d6] |
Sleaze | Mark Manipulation | Intuition + Firewall | Transys Avalon [9d6] | |
Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [3] | [3d6] | |
Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [3] | [3d6] |
Attack | Matrix Combat | Intuition + Firewall | Transys Avalon [9d6] | |
Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [3] | [3d6] |
Attack | Matrix Combat | Intuition + Firewall | Transys Avalon [9d6] | |
Enter / Exit host | 1 | Exit Host to where you entered from | ||
Data Processing | Miscellaneous | |||
Grid Hop | - | Mast have permission, must leave host first | ||
Data Processing | Miscellaneous | |||
Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [] + Intuition [3] | [3d6] |
Sleaze | Miscellaneous | Intuition + Data Processing | Transys Avalon [9d6] | |
Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [] + Logic [3] | [3d6] |
Attack | Miscellaneous | |||
Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [] + Logic [3] | [3d6] |
Data Processing | Miscellaneous | Willpower + Firewall | Transys Avalon [9d6] |
Katana Weapon Focus (3) [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Lined Coat [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Certified Credstick, Ebony [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 5 |
Firewall | 5 |
Certified Credstick, Silver [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 5 |
Firewall | 5 |
Facility, Armorer [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Transys Avalon [12] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 6 |
Firewall | 6 |
name | modified | dicepool | specialization |
---|---|---|---|
Armorer | 1 | 4 | |
Blades | 6 | 11 | Swords +2 |
Gymnastics | 3 | 8 | Leaping +2 |
Pilot Ground Craft | 1 | 8 | |
Pistols | 1 | 6 | |
Running | 2 | 7 | |
Sneaking | 3 | 8 | |
Throwing Weapons | 1 | 6 | |
Unarmed Combat | 4 | 9 | Karate +2 |
Bushido | 5 | 8 | |
Shinto | 1 | 4 | |
English | 6 | 9 | |
Japanese | 1 | 4 |
Attribute | Rating |
---|---|
Body | 5 |
Agility | 5 |
Reaction | 7 |
Strength | 5 |
Willpower | 3 |
Logic | 3 |
Intuition | 3 |
Charisma | 3 |
Essence | 6 |
Edge | 2 |
Magic | 6 |
Initiative | 10 |
Simple Actions | Marks | Note | Test: Source | d6 |
Change Icon | Owner | Change target icon, or self | ||
Data Processing | Miscellaneous | |||
Check Overwatch Score | - | Get OS from GM | Electronic Warfare [] + Logic [3] | [3d6] |
Sleaze | Information Gathering | 6d6 | ||
Invite Mark | Owner | Choose # of Marks and Duration | ||
Data Processing | Mark Manipulation | |||
Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [3] | [3d6] |
Firewall | Miscellaneous | Logic + Attack | EvoTech Himitsu [3d6] | |
Send Message | - | Send short sentence, image, or file to user. | ||
Data Processing | Miscellaneous | |||
Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
Data Processing | Miscellaneous | |||
Complex Actions | Marks | Note | Test: Source | d6 |
Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [3] | [3d6] |
Sleaze | Device Manipulation | Willpower + Firewall | EvoTech Himitsu [5d6] | |
Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [3] | [3d6] |
Data Processing | Device Manipulation | Willpower + Firewall | EvoTech Himitsu [5d6] | |
Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [2] | [2d6] |
Sleaze | Device Manipulation | Logic + Firewall | EvoTech Himitsu [5d6] | |
Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [3] | [3d6] |
Sleaze | Device Manipulation | Logic + Firewall | EvoTech Himitsu [5d6] | |
Crack File | 1 | Remove File Protection | Hacking [] + Logic [3] | [3d6] |
Attack | File Manipulation | 2 * Protection Rating | ||
Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [2] | [2d6] |
Firewall | File Manipulation | 2 * Data Bomb Rating | ||
Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [3] | [3d6] |
Data Processing | File Manipulation | Intuition + Firewall | EvoTech Himitsu [4d6] | |
Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [3] | [3d6] |
Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [2] | [2d6] |
Data Processing | Information Gathering | Logic + Sleaze | EvoTech Himitsu [8d6] | |
Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [] + Intuition [2] | [2d6] |
Sleaze | Information Gathering | Logic + Firewall | EvoTech Himitsu [5d6] | |
Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [2] | [2d6] |
Data Processing | Information Gathering | Willpower + Sleaze | EvoTech Himitsu [8d6] | |
Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | Willpower + Firewall | EvoTech Himitsu [5d6] | |
Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | Willpower + Firewall | EvoTech Himitsu [5d6] | |
Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [3] | [3d6] |
Sleaze | Mark Manipulation | Intuition + Firewall | EvoTech Himitsu [4d6] | |
Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [3] | [3d6] | |
Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [3] | [3d6] |
Attack | Matrix Combat | Intuition + Firewall | EvoTech Himitsu [4d6] | |
Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [3] | [3d6] |
Attack | Matrix Combat | Intuition + Firewall | EvoTech Himitsu [4d6] | |
Enter / Exit host | 1 | Exit Host to where you entered from | ||
Data Processing | Miscellaneous | |||
Grid Hop | - | Mast have permission, must leave host first | ||
Data Processing | Miscellaneous | |||
Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [] + Intuition [2] | [2d6] |
Sleaze | Miscellaneous | Intuition + Data Processing | EvoTech Himitsu [4d6] | |
Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [] + Logic [3] | [3d6] |
Attack | Miscellaneous | |||
Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [] + Logic [3] | [3d6] |
Data Processing | Miscellaneous | Willpower + Firewall | EvoTech Himitsu [5d6] |
Cavalier Arms Urban Tribe Tomahawk [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Cavalier Arms Urban Tribe Tomahawk [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Cavalier Arms Urban Tribe Tomahawk [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Cavalier Arms Urban Tribe Tomahawk [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Cavalier Arms Urban Tribe Tomahawk (Melee) [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Cavalier Arms Urban Tribe Tomahawk (Melee) [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Cavalier Arms Urban Tribe Tomahawk (Melee) [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Cavalier Arms Urban Tribe Tomahawk (Melee) [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Combat Axe [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Armor Clothing [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Bone Lacing (Aluminum) [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Lined Coat [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
EvoTech Himitsu [4] | |
---|---|
Attack | 0 |
Sleaze | 5 |
Data Processing | 2 |
Firewall | 2 |
name | modified | dicepool | specialization |
---|---|---|---|
Blades | 6 | 12 | Axes +2 |
Gunnery | 2 | 8 | |
Intimidation | 2 | 5 | |
Locksmith | 2 | 8 | |
Perception | 2 | 4 | |
Pilot Ground Craft | 1 | 7 | |
Throwing Weapons | 6 | 12 | |
Houston Gangs | 2 | 4 | |
Houston Upper Class | 2 | 4 | |
Serial Killing | 2 | 4 | |
English | 1 | 3 | |
Japanese | 2 | 4 | |
Spanish | 2 | 4 |
Attribute | Rating |
---|---|
Body | 10 |
Agility | 6 |
Reaction | 6 |
Strength | 11 |
Willpower | 3 |
Logic | 3 |
Intuition | 2 |
Charisma | 1 |
Essence | 1 |
Edge | 6 |
Initiative | 8 |
Simple Actions | Marks | Note | Test: Source | d6 |
Change Icon | Owner | Change target icon, or self | ||
Data Processing | Miscellaneous | |||
Check Overwatch Score | - | Get OS from GM | Electronic Warfare [] + Logic [3] | [3d6] |
Sleaze | Information Gathering | 6d6 | ||
Invite Mark | Owner | Choose # of Marks and Duration | ||
Data Processing | Mark Manipulation | |||
Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [5] | [5d6] |
Firewall | Miscellaneous | Logic + Attack | Common Denominator Element [3d6] | |
Send Message | - | Send short sentence, image, or file to user. | ||
Data Processing | Miscellaneous | |||
Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
Data Processing | Miscellaneous | |||
Complex Actions | Marks | Note | Test: Source | d6 |
Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [3] | [3d6] |
Sleaze | Device Manipulation | Willpower + Firewall | Common Denominator Element [7d6] | |
Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [3] | [3d6] |
Data Processing | Device Manipulation | Willpower + Firewall | Common Denominator Element [7d6] | |
Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [10] | [10d6] |
Sleaze | Device Manipulation | Logic + Firewall | Common Denominator Element [5d6] | |
Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [3] | [3d6] |
Sleaze | Device Manipulation | Logic + Firewall | Common Denominator Element [5d6] | |
Crack File | 1 | Remove File Protection | Hacking [] + Logic [3] | [3d6] |
Attack | File Manipulation | 2 * Protection Rating | ||
Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [10] | [10d6] |
Firewall | File Manipulation | 2 * Data Bomb Rating | ||
Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [3] | [3d6] |
Data Processing | File Manipulation | Intuition + Firewall | Common Denominator Element [12d6] | |
Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [3] | [3d6] |
Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [10] | [10d6] |
Data Processing | Information Gathering | Logic + Sleaze | Common Denominator Element [3d6] | |
Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [] + Intuition [10] | [10d6] |
Sleaze | Information Gathering | Logic + Firewall | Common Denominator Element [5d6] | |
Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [10] | [10d6] |
Data Processing | Information Gathering | Willpower + Sleaze | Common Denominator Element [5d6] | |
Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | Willpower + Firewall | Common Denominator Element [7d6] | |
Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | Willpower + Firewall | Common Denominator Element [7d6] | |
Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [3] | [3d6] |
Sleaze | Mark Manipulation | Intuition + Firewall | Common Denominator Element [12d6] | |
Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [3] | [3d6] | |
Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [3] | [3d6] |
Attack | Matrix Combat | Intuition + Firewall | Common Denominator Element [12d6] | |
Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [3] | [3d6] |
Attack | Matrix Combat | Intuition + Firewall | Common Denominator Element [12d6] | |
Enter / Exit host | 1 | Exit Host to where you entered from | ||
Data Processing | Miscellaneous | |||
Grid Hop | - | Mast have permission, must leave host first | ||
Data Processing | Miscellaneous | |||
Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [] + Intuition [10] | [10d6] |
Sleaze | Miscellaneous | Intuition + Data Processing | Common Denominator Element [12d6] | |
Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [] + Logic [3] | [3d6] |
Attack | Miscellaneous | |||
Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [] + Logic [3] | [3d6] |
Data Processing | Miscellaneous | Willpower + Firewall | Common Denominator Element [7d6] |
Knucks [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Shock Glove [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Chameleon Suit [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Binoculars, Optical [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Common Denominator Element [4] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Ebony Cred Card $4476 [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 5 |
Firewall | 5 |
Galveston casino chips [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Magical Lodge Materials [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Reagents, Raw (dram) [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Sustaining Focus [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Sustaining Focus [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
name | modified | dicepool | specialization |
---|---|---|---|
Outdoors Group | 2 | ||
Assensing | 4 | 14 | |
Binding | 6 | 12 | Guardian Spirits +2 |
Flight | 3 | 9 | |
Navigation | 2 | 12 | |
Perception | 4 | 15 | Visual +2 |
Sneaking | 3 | 9 | |
Spellcasting | 5 | 11 | |
Summoning | 6 | 12 | Guardian Spirits +2 |
Survival | 2 | 7 | |
Tracking | 2 | 12 | |
Unarmed Combat | 5 | 11 | |
Magical Security | 6 | 9 | |
Paranormal Animals | 6 | 9 | |
Physical Security | 6 | 9 | |
English | 1 | 11 |
Attribute | Rating |
---|---|
Body | 4 |
Agility | 6 |
Reaction | 5 |
Strength | 6 |
Willpower | 5 |
Logic | 3 |
Intuition | 10 |
Charisma | 4 |
Essence | 6 |
Edge | 3 |
Magic | 6 |
Initiate Grade | 1 |
Initiative | 17 |
Simple Actions | Marks | Note | Test: Source | d6 |
Change Icon | Owner | Change target icon, or self | ||
Data Processing | Miscellaneous | |||
Check Overwatch Score | - | Get OS from GM | Electronic Warfare [] + Logic [3] | [3d6] |
Sleaze | Information Gathering | 6d6 | ||
Invite Mark | Owner | Choose # of Marks and Duration | ||
Data Processing | Mark Manipulation | |||
Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [5] | [5d6] |
Firewall | Miscellaneous | Logic + Attack | ||
Send Message | - | Send short sentence, image, or file to user. | ||
Data Processing | Miscellaneous | |||
Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
Data Processing | Miscellaneous | |||
Complex Actions | Marks | Note | Test: Source | d6 |
Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [3] | [3d6] |
Sleaze | Device Manipulation | Willpower + Firewall | ||
Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [3] | [3d6] |
Data Processing | Device Manipulation | Willpower + Firewall | ||
Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [6] | [6d6] |
Sleaze | Device Manipulation | Logic + Firewall | ||
Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [3] | [3d6] |
Sleaze | Device Manipulation | Logic + Firewall | ||
Crack File | 1 | Remove File Protection | Hacking [] + Logic [3] | [3d6] |
Attack | File Manipulation | 2 * Protection Rating | ||
Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [6] | [6d6] |
Firewall | File Manipulation | 2 * Data Bomb Rating | ||
Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [3] | [3d6] |
Data Processing | File Manipulation | Intuition + Firewall | ||
Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [3] | [3d6] |
Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [6] | [6d6] |
Data Processing | Information Gathering | Logic + Sleaze | ||
Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [] + Intuition [6] | [6d6] |
Sleaze | Information Gathering | Logic + Firewall | ||
Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [6] | [6d6] |
Data Processing | Information Gathering | Willpower + Sleaze | ||
Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | Willpower + Firewall | ||
Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | Willpower + Firewall | ||
Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [3] | [3d6] |
Sleaze | Mark Manipulation | Intuition + Firewall | ||
Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [3] | [3d6] | |
Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [3] | [3d6] |
Attack | Matrix Combat | Intuition + Firewall | ||
Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [3] | [3d6] |
Attack | Matrix Combat | Intuition + Firewall | ||
Enter / Exit host | 1 | Exit Host to where you entered from | ||
Data Processing | Miscellaneous | |||
Grid Hop | - | Mast have permission, must leave host first | ||
Data Processing | Miscellaneous | |||
Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [] + Intuition [6] | [6d6] |
Sleaze | Miscellaneous | Intuition + Data Processing | ||
Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [] + Logic [3] | [3d6] |
Attack | Miscellaneous | |||
Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [] + Logic [3] | [3d6] |
Data Processing | Miscellaneous | Willpower + Firewall |
name | modified | dicepool | specialization |
---|---|---|---|
Perception | 4 | 10 | |
Running | 5 | 13 | |
Sneaking | 4 | 9 | |
Tracking | 4 | 10 | |
Unarmed Combat | 7 | 12 |
Attribute | Rating |
---|---|
Body | 9 |
Agility | 5 |
Reaction | 4 |
Strength | 8 |
Willpower | 5 |
Logic | 3 |
Intuition | 6 |
Charisma | 3 |
Essence | 6 |
Edge | 3 |
Initiative | 10 |
Simple Actions | Marks | Note | Test: Source | d6 |
Change Icon | Owner | Change target icon, or self | ||
Data Processing | Miscellaneous | |||
Check Overwatch Score | - | Get OS from GM | Electronic Warfare [] + Logic [3] | [3d6] |
Sleaze | Information Gathering | 6d6 | ||
Invite Mark | Owner | Choose # of Marks and Duration | ||
Data Processing | Mark Manipulation | |||
Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [] + Willpower [5] | [5d6] |
Firewall | Miscellaneous | Logic + Attack | Ear buds [3d6] Micro-Tranceiver [3d6] Renraku Sensei [3d6] | |
Send Message | - | Send short sentence, image, or file to user. | ||
Data Processing | Miscellaneous | |||
Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
Data Processing | Miscellaneous | |||
Complex Actions | Marks | Note | Test: Source | d6 |
Format Device | 3 | Device is Formatted on next Reboot | Computer [] + Logic [3] | [3d6] |
Sleaze | Device Manipulation | Willpower + Firewall | Ear buds [7d6] Micro-Tranceiver [7d6] Renraku Sensei [8d6] | |
Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [] + Logic [3] | [3d6] |
Data Processing | Device Manipulation | Willpower + Firewall | Ear buds [7d6] Micro-Tranceiver [7d6] Renraku Sensei [8d6] | |
Spoof Command | 1 | Send command as though Owner | Hacking [] + Intuition [3] | [3d6] |
Sleaze | Device Manipulation | Logic + Firewall | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [] + Logic [3] | [3d6] |
Sleaze | Device Manipulation | Logic + Firewall | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
Crack File | 1 | Remove File Protection | Hacking [] + Logic [3] | [3d6] |
Attack | File Manipulation | 2 * Protection Rating | ||
Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [] + Intuition [3] | [3d6] |
Firewall | File Manipulation | 2 * Data Bomb Rating | ||
Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [] + Logic [3] | [3d6] |
Data Processing | File Manipulation | Intuition + Firewall | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [] + Logic [3] | [3d6] |
Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
Matrix Perception | - | Opposed if target is running silent | Computer [] + Inuition [3] | [3d6] |
Data Processing | Information Gathering | Logic + Sleaze | Ear buds [3d6] Micro-Tranceiver [3d6] Renraku Sensei [3d6] | |
Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [] + Intuition [3] | [3d6] |
Sleaze | Information Gathering | Logic + Firewall | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
Trace Icon | 2 | Locate Physical Location of device/persona | Computer [] + Intuition [3] | [3d6] |
Data Processing | Information Gathering | Willpower + Sleaze | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [5d6] | |
Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | Willpower + Firewall | Ear buds [7d6] Micro-Tranceiver [7d6] Renraku Sensei [8d6] | |
Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [] + Logic [3] | [3d6] |
Attack | Mark Manipulation | Willpower + Firewall | Ear buds [7d6] Micro-Tranceiver [7d6] Renraku Sensei [8d6] | |
Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [] + Logic [3] | [3d6] |
Sleaze | Mark Manipulation | Intuition + Firewall | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [] + Logic [3] | [3d6] | |
Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [] + Logic [3] | [3d6] |
Attack | Matrix Combat | Intuition + Firewall | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [] + Logic [3] | [3d6] |
Attack | Matrix Combat | Intuition + Firewall | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
Enter / Exit host | 1 | Exit Host to where you entered from | ||
Data Processing | Miscellaneous | |||
Grid Hop | - | Mast have permission, must leave host first | ||
Data Processing | Miscellaneous | |||
Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [] + Intuition [3] | [3d6] |
Sleaze | Miscellaneous | Intuition + Data Processing | Ear buds [5d6] Micro-Tranceiver [5d6] Renraku Sensei [6d6] | |
Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [] + Logic [3] | [3d6] |
Attack | Miscellaneous | |||
Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [] + Logic [3] | [3d6] |
Data Processing | Miscellaneous | Willpower + Firewall | Ear buds [7d6] Micro-Tranceiver [7d6] Renraku Sensei [8d6] |
Ares "One" Monosword [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Ares Light Fire 70 [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Ares Predator V [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Knife [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Armor Vest [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Ballistic Mask (Customized) [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Lined Coat [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Certified Credstick, Silver [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 5 |
Firewall | 5 |
Concealable Holster [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Ear buds [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Flashlight [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Glasses [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Magical Lodge Materials [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Medkit [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Metal Restraints [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Micro-Tranceiver [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Quick-Draw Holster [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Renraku Sensei [6] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 3 |
Firewall | 3 |
Survival Kit [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
name | modified | dicepool | specialization |
---|---|---|---|
Conjuring Group | 2 | ||
Alchemy | 3 | 9 | |
Arcana | 4 | 7 | |
Artificing | 2 | 8 | |
Assensing | 4 | 7 | |
Astral Combat | 3 | 8 | |
Banishing | 2 | 8 | |
Binding | 2 | 8 | |
Blades | 5 | 8 | |
Counterspelling | 5 | 11 | |
Intimidation | 1 | 8 | |
Perception | 2 | 5 | |
Pistols | 2 | 5 | |
Spellcasting | 6 | 12 | |
Summoning | 2 | 8 | |
Unarmed Combat | 2 | 5 | |
20th Century Horror Movies | 2 | 5 | |
Business Finance | 2 | 5 | |
Gang Identification | 2 | 5 | |
Parazoology | 2 | 5 | |
Psycology | 2 | 5 | |
Russian Mythology | 3 | 6 | |
English | 1 | 4 | |
German | 1 | 4 | |
Latin | 1 | 4 | |
Russian | 1 | 4 |
Attribute | Rating |
---|---|
Body | 3 |
Agility | 3 |
Reaction | 4 |
Strength | 3 |
Willpower | 5 |
Logic | 3 |
Intuition | 3 |
Charisma | 5 |
Essence | 6 |
Edge | 3 |
Magic | 6 |
Initiate Grade | 1 |
Initiative | 7 |
Simple Actions | Marks | Note | Test: Source | d6 |
Change Icon | Owner | Change target icon, or self | ||
Data Processing | Miscellaneous | |||
Check Overwatch Score | - | Get OS from GM | Electronic Warfare [3] + Logic [5] | [8d6] |
Sleaze | Information Gathering | 6d6 | ||
Invite Mark | Owner | Choose # of Marks and Duration | ||
Data Processing | Mark Manipulation | |||
Jack Out | Owner | Reboot and Dumpshock. Roll only for Linklock | Hardware [2] + Willpower [5] | [7d6] |
Firewall | Miscellaneous | Logic + Attack | Living Persona [9d6] Meta Link (Decoy) [5d6] Meta Link (Family) [5d6] Meta Link (Reality Hackers) [5d6] Microdeck Summit [6d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] | |
Send Message | - | Send short sentence, image, or file to user. | ||
Data Processing | Miscellaneous | |||
Switch Interface Mode | Owner | AR to VR and vice versa. Can't if Linklocked | ||
Data Processing | Miscellaneous | |||
Complex Actions | Marks | Note | Test: Source | d6 |
Format Device | 3 | Device is Formatted on next Reboot | Computer [4] + Logic [5] | [9d6] |
Sleaze | Device Manipulation | Willpower + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] | |
Reboot Device | 3 | Dumpshock. Can't reboot if Linklocked | Computer [4] + Logic [5] | [9d6] |
Data Processing | Device Manipulation | Willpower + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] | |
Spoof Command | 1 | Send command as though Owner | Hacking [5] + Intuition [6] | [11d6] |
Sleaze | Device Manipulation | Logic + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] | |
Garbage In/Garbage Out | 3 | Change command result (Pulling Trigger ejects) | Sofware [5] + Logic [5] | [10d6] |
Sleaze | Device Manipulation | Logic + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] | |
Crack File | 1 | Remove File Protection | Hacking [5] + Logic [5] | [10d6] |
Attack | File Manipulation | 2 * Protection Rating | ||
Disarm Data Bomb | - | Triggers Data Bomb on Failure | Software [5] + Intuition [6] | [11d6] |
Firewall | File Manipulation | 2 * Data Bomb Rating | ||
Edit File | 1 | Create, Change, Copy, Delete, or Protect any File | Computer [4] + Logic [5] | [9d6] |
Data Processing | File Manipulation | Intuition + Firewall | Living Persona [11d6] Meta Link (Decoy) [7d6] Meta Link (Family) [7d6] Meta Link (Reality Hackers) [7d6] Microdeck Summit [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] | |
Set Data Bomb | 1 | Choose Rating, Does Rating(d6) Matrix DV | Software [5] + Logic [5] | [10d6] |
Sleaze | File Manipulation | 2 * Data Bomb Rating | ||
Matrix Perception | - | Opposed if target is running silent | Computer [4] + Inuition [6] | [10d6] |
Data Processing | Information Gathering | Logic + Sleaze | Living Persona [11d6] Meta Link (Decoy) [5d6] Meta Link (Family) [5d6] Meta Link (Reality Hackers) [5d6] Microdeck Summit [9d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] | |
Snoop | 1 | View/Record traffic to/from Marked Device | Electronic Warfare [3] + Intuition [6] | [9d6] |
Sleaze | Information Gathering | Logic + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] | |
Trace Icon | 2 | Locate Physical Location of device/persona | Computer [4] + Intuition [6] | [10d6] |
Data Processing | Information Gathering | Willpower + Sleaze | Living Persona [11d6] Meta Link (Decoy) [5d6] Meta Link (Family) [5d6] Meta Link (Reality Hackers) [5d6] Microdeck Summit [9d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] Renraku Sensei [5d6] | |
Brute Force Attack | - | +1 Mark. Optional +1 Matrix DV per 2 net hits | Cybercombat [4] + Logic [5] | [9d6] |
Attack | Mark Manipulation | Willpower + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] | |
Brute Force Grid Hop | - | Hop to Grid you don't have access to | Cybercombat [4] + Logic [5] | [9d6] |
Attack | Mark Manipulation | 4 (local) or 6 (global) | ||
Erase Mark | 3 | Remove Marks on single icon from single icon | Computer [4] + Logic [5] | [9d6] |
Attack | Mark Manipulation | Willpower + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] | |
Hack on the Fly | - | +1 Mark. +1 Matrix Perception Hit per 2 Net Hits | Hacking [5] + Logic [5] | [10d6] |
Sleaze | Mark Manipulation | Intuition + Firewall | Living Persona [11d6] Meta Link (Decoy) [7d6] Meta Link (Family) [7d6] Meta Link (Reality Hackers) [7d6] Microdeck Summit [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] | |
Hack on the Fly Grid Hop | Hop to grid you don't have access to | Hacking [5] + Logic [5] | [10d6] | |
Sleaze | Mark Manipulation | 4 (local) or 6 (global) | ||
Crash Program | 1 | Crash a specific program until Reboot | Cybercombat [4] + Logic [5] | [9d6] |
Attack | Matrix Combat | Intuition + Firewall | Living Persona [11d6] Meta Link (Decoy) [7d6] Meta Link (Family) [7d6] Meta Link (Reality Hackers) [7d6] Microdeck Summit [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] | |
Data Spike | - | DV = Attack + Net Hits + 2 * Marks | Cybercombat [4] + Logic [5] | [9d6] |
Attack | Matrix Combat | Intuition + Firewall | Living Persona [11d6] Meta Link (Decoy) [7d6] Meta Link (Family) [7d6] Meta Link (Reality Hackers) [7d6] Microdeck Summit [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] | |
Enter / Exit host | 1 | Exit Host to where you entered from | ||
Data Processing | Miscellaneous | |||
Grid Hop | - | Mast have permission, must leave host first | ||
Data Processing | Miscellaneous | |||
Hide | 0 | Disappear from target that hasn't Marked you | Electronic Warfare [3] + Intuition [6] | [9d6] |
Sleaze | Miscellaneous | Intuition + Data Processing | Living Persona [11d6] Meta Link (Decoy) [7d6] Meta Link (Family) [7d6] Meta Link (Reality Hackers) [7d6] Microdeck Summit [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] Renraku Sensei [9d6] | |
Jam Signals | Owner | Add Hits to Noise for 100m | Electronic Warfare [3] + Logic [5] | [8d6] |
Attack | Miscellaneous | |||
Jump into Rigged Device | 3 | No test if owner or have permission | Electronic Warfare [3] + Logic [5] | [8d6] |
Data Processing | Miscellaneous | Willpower + Firewall | Living Persona [10d6] Meta Link (Decoy) [6d6] Meta Link (Family) [6d6] Meta Link (Reality Hackers) [6d6] Microdeck Summit [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] Renraku Sensei [8d6] |
Ares Light Fire 75 [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Flash-Pak Grenade [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Stun Dongle [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Survival Knife [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Ace of Cups [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Black Biker Gloves [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Chameleon Suit [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Doc Martens 1914 Smoothes [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Fancy T-Shirt [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Go Ganger Outfit [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Respirator [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Swimmers Cap [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Asylum [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Beltpouch [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Bug Scanner [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Data Tap [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Datachip [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 1 |
Firewall | 1 |
Electronic Paper [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 1 |
Firewall | 1 |
Electronic Parts [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Endoscope [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Goggles [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Hidden Gun Arm Slide [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Key/Combination Lock [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Long Haul [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Meta Link (Decoy) [2] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 1 |
Firewall | 1 |
Meta Link (Family) [2] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 1 |
Firewall | 1 |
Meta Link (Reality Hackers) [2] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 1 |
Firewall | 1 |
Microdeck Summit [6] | |
---|---|
Attack | 1 |
Sleaze | 4 |
Data Processing | 3 |
Firewall | 3 |
Myomeric Rope (m) [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Nausea Gas [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Renraku Sensei [6] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 3 |
Firewall | 3 |
Renraku Sensei [6] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 3 |
Firewall | 3 |
Renraku Sensei [6] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 3 |
Firewall | 3 |
Renraku Sensei [6] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 3 |
Firewall | 3 |
Renraku Sensei [6] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 3 |
Firewall | 3 |
Renraku Sensei [6] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 3 |
Firewall | 3 |
Sensor Tags [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Sensor Tags [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Sensor Tags [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Stim Patch [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Tool Kit, Hardware [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 2 |
Firewall | 2 |
Trodes [] | |
---|---|
Attack | 0 |
Sleaze | 0 |
Data Processing | 3 |
Firewall | 3 |
name | modified | dicepool | specialization |
---|---|---|---|
Compiling | 5 | 11 | Machine Sprites +2 |
Computer | 4 | 9 | |
Cybercombat | 4 | 9 | |
Electronic Warfare | 3 | 8 | Communications +2 |
Hacking | 5 | 10 | vs. Personas +2 |
Hardware | 2 | 7 | Cyberdecks +2 |
Perception | 2 | 8 | |
Pistols | 1 | 3 | Semi-Automatics +2 |
Registering | 5 | 11 | |
Software | 5 | 10 | Cleaner +2 |
Corporate Security | 4 | 9 | |
Security Design | 5 | 10 | Matrix +2, Electronic +2 |
Chinese | 1 | 7 | |
English | 1 | 7 | |
Japanese | 4 | 10 | Speak +2 |
Latin | 2 | 8 | |
Spanish | 3 | 9 |
Attribute | Rating |
---|---|
Body | 2 |
Agility | 2 |
Reaction | 3 |
Strength | 1 |
Willpower | 5 |
Logic | 5 |
Intuition | 6 |
Charisma | 4 |
Essence | 6 |
Edge | 4 |
Resonance | 6 |
Submersion Grade | 1 |
Initiative | 9 |