Jump to content

Hacking Super-Skills


Steve
 Share

Recommended Posts

Are there any write-ups for super-skills for hacking? I'm working on an ultimate black hat hacker, and I wanted to give them some super-skills that would be appropriate for incredible abilities at coding and cyber intrusion, beyond what just having skills like Computer Programming could do.

Link to comment
Share on other sites

 

 

You are who and what the computers say you are. Who do you want to be today?: (Total: 4 Active Cost, 1 Real Cost) Deep Cover, Usable Simultaneously (all targets standing within 10 meters of Grantor; +1 1/4), Grantor must grant power one Recipient at a time. (4 Active Points); OAF Immobile (Networked computer + specialized equipment to generate ID cards, etc. ; -2), Extra Time (20 Minutes, Only to Activate, Character May Take No Other Actions, -1 1/2), Requires A Roll (Skill roll: Power Skill hacking; Must be made each Phase/use; -1) (Real Cost: 1)

 

 

It's always easier to make something STOP working: (Total: 10 Active Cost, 3 Real Cost) Dispel Technology 1d6, Technology (+1/2), Penetrating (+1/2), Cumulative (48 points; +1 1/4) (10 Active Points); Requires A Roll (Skill roll: Power Skill Hacking; Must be made each Phase/use; -1), No Range (-1/2), Extra Time (Full Phase, -1/2), Concentration (1/2 DCV; -1/4) (Real Cost: 3)

 

 

All your database are belong to me: (Total: 105 Active Cost, 23 Real Cost) Possession (Mind Control Effect Roll 40; Telepathy Effect Roll 30), No Blackout (+1/4), No Feedback (+1/2) (105 Active Points); Skin Contact Required (-1), Limited Class Of Minds Terrestrial computers (-1/2), Stops Working If Mentalist Is Stunned (-1/2), Concentration, Must Concentrate throughout use of Constant Power (1/2 DCV; -1/2), Required Hands Two-Handed (-1/2), Restrainable (-1/2) (Real Cost: 23)

 

 

Lucius Alexander

 

The palindromedary says I can hack it

Link to comment
Share on other sites

Mental Powers against the Machine Class of Mind

Mind Control can override locks.

Telepathy can find the best secured secrets.*

And everything that somewhat makes sense under that SFX

 

*If there is actually a connection to the information. Best security has always been to make a (mostly) isolated system.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...