Project Ozymandias The machine to end all machines

3
This Artifact allows you to issue commands to technological devices.
Used by Dominic West, Created by leonvanderblight.
On Legendary Artifact Project Ozymandias.
(When activating this Effect, it is obvious you are interacting with the target. You must actively and obviously be using up A laptop battery. You must use this Artifact obviously when activating this Effect.)

Waterproof, bulletproof, and as fireproof as anything in it's category can be the hardened reinforced steel laptop weighs in at a hefty 10 lbs, but it delivers performance beyond anything else in it's category. With hardware that makes a supercomputer blush, and a petabyte of ram any system you set this bad boy to cracking will be crying for it's mother by the end of a minute. Combine that with it's built in destroyer protocol and you'll find that the devices it targets are rendered completely unusable!


Exert your Mind and spend 2 Actions to activate. Select a Device within 300 feet. Can be used on Alien technology. You must use up A laptop battery in order to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.

Possession of this Artifact causes the following Trauma to manifest over the course of a day: Conspiracy Nut: You believe any conspiracy theories told to you.. If you lose possession of this Artifact, the Trauma heals over the course of the next month.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

You are viewing an old version of this Gift.
To view the most recent version Click Here

Revision purchased with:
Improvement from writing up Triassic Royal Rumble (Finish this) spent on improving power: Project Ozymandias
Revision purchased with:
Revision purchased with:

Community Hack Gifts

Spend 2 Actions. Select a Device within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Every hack you make leaves behind a lightning bolt in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

This Gift's Cost is capped at 2 and cannot be increased further.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

A manifestation of Tam's telekinetic abilities, Tam has learned to manipulate the internals of electronics.

Spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. You must make a Trauma roll when you use this Effect. Its Difficulty cannot be reduced by any means. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

This Effect is not obvious, and the only sign you are using an Effect is fingers tapping against your side. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.

This Gift's Cost is capped at 2 and cannot be increased further.

Possession of this Power grants the following Battle Scar: Atrophied Shoulder - One of your shoulders is damaged. Whenever it takes a major blow or is otherwise put under stress the GM may dislocate it. A dislocated limb cannot be used until you Exert your Mind and spend an Action to reset it.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

The Lotus III implant has been upgraded. Sophisticated decryption & code-breaking software is pre-loaded into the implant, optimized to synchronize with the end-user's conscious attempts to crack security systems. Capable of defeating the most sophisticated systems in moments, use of this feature causes the user's eyes to display the familiar Lotus Logo as a revolving pattern on the iris. Additionally, in what we consider to be a win for our marketing team, any device compromised by our software will display our Lotus Logo in system - all the better to alert potential clients of system vulnerabilities.

Operating the system linkage on a regular basis has been proven to damage the optic nerves: always use caution when operating prototype cybernetics.

Exert your Mind and spend 1 Action. Select a Computer within 300 feet. Can be used on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you go Blind. Roll Perception + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind Lotus Logo in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you disable the artifact for a downtime as it hacks itself.. Roll Dexterity + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Every hack you make leaves behind A gif of a seal clapping and arfing. in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Kyle is not fully human. He doesn't quite know it yet, but a part of his brain's been replaced with cybernetics and electronics. Using an antennae located in his head, he is able to subconsciously operate these bio-technical electronics responsible for interfacing with computer systems.

Hates cops, hates the system, smokes pot - he's a real cyberpunk now, ain't he?

Exert your Mind and spend 1 minute. Select a Device within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Stock Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.