True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. They scrub the system of footprints, leaving no trace behind.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you the device short-circuits and can no longer be used at all. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
Passing someone a joint, is a really nice thing to do. When someone passes you a smoke, then they feel more obliged to do you a favour.
The dude uses this, to get people to do something for him. He offers them a smoke in exchange for them doing something for him.
“I’m so fucking faded dude, can you get me a water. My mouth is so fucking dry holy shit.”
Exert your Mind and spend at least one Action. Select a Sapient target within 20 feet. You must actively and obviously use Item used for smoking (Cigarette / Joint / Blunt / Pipe) to activate this Effect. Your target may be actively engaged in Combat. Communicate a command to your target. Roll Charisma + Influence at Difficulty 6. The target may resist by rolling Mind at Difficulty 7.
If the contested Outcome is positive, your target will be compelled to follow your command to their best understanding of the letter and spirit of the command until they have completed it or for your Contested Outcome in minutes. You cannot issue another suggestion to the target until 10 minutes after they have completed the first command or 10 minutes after a failure.
The target is unaware that they are under supernatural influence and feel they are acting of their own free will. If you fail, they realize that you were attempting to influence them supernaturally with your command.
Your command can be an order to take an immediate Action. You cannot order a target to "do nothing," and they are free to take other Actions as they fulfill your request. Your command cannot be obviously self-destructive. The Effect ends if following your command would cause a target to cross one of their Limits in a way that would necessitate a Trauma roll.
This implant sits behind Liv’s left ear, a patch of metal that has an odd, unique port in it, alongside what appears to be slots for memory cards.
When she uses this implant, the implant projects the code across her eyes, making it nearly impossible to know what she’s doing unless you know what you are looking for.
Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is your eyes reflecting the programs you are running. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
Spend 2 Actions. Select a Device within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind a lightning bolt in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
This Gift's Cost is capped at 2 and cannot be increased further.
The clown spends a few moments miming out an invisible wall. Suddenly, it becomes real, and a wall made of Aluminium oxynitride can be seen, slightly distorting the light around it.
Exert your Mind and spend an Action. Select a Location within arm's reach.
Select one of the following alterations to create out of Plexiglass originating at the target:
The alteration begins to form when you activate this Effect and finishes forming on your initiative in the next Round. Until it finishes forming, it is not guaranteed to function.
This alteration lasts three hours but may be prematurely destroyed or altered. Your alterations may be broken through with appropriate tools. Anyone attempting to break through must roll Brawn + a relevant Ability. A cumulative Outcome of 6 across all attempts breaks a hole large enough to move through. See the extended system text for GM guidance on various tools.
Staring at people can get you in trouble but sometimes get what is wrong about them is far better.
Exert your Mind and spend an Action to activate. Select a Sapient target or a Creature within 20 feet. You must actively and obviously use Ring of Power to activate this Effect. At the end of your investigation, roll Dexterity + Legerdemain at Difficulty 6.
You learn all the following information about your target:
The quality and specificity of information gained depends on your Outcome.
After you finish activating this Effect, you cannot move quicker than a walk (max 15 feet per Round) for one minute and suffer a -1 dice penalty for an hour.
The mystic channels and communes directly with another person's spirit, allowing the two of them to freely exchange both physical and mental wounds between each other.
Exert your Mind and spend an Action. Select a Sapient target within arm's reach. Your target may Resist to cancel the transfer.
You may choose a single instance of one of the following to transfer from your target to yourself, or from yourself to them:
Whenever you transfer an Injury, it's Severity increases by 1. Whenever you transfer Mind damage or Traumas, the recipient takes an additional Mind damage.
After you finish activating this Effect, you cannot move quicker than a walk (max 15 feet per Round) for one minute and suffer a -1 dice penalty for an hour. Exhaustion’s penalty and duration stacks with multiple activations.
The Witch gazes at a calm and trusting animal and blinks, revealing eyes that have changed to match the creature's. Her body goes limp and collapses, and the witch proceeds to walk away, now temporarily borrowing the animal's body.
A borrowing Witch is a visitor in the animal's mind and cannot overstay her welcome or force the animal into danger.
Spend an Action or Reaction. Select a Non-Alien Creature target within 20 feet. The target may Resist.
You possess your target and have control over their actions for the next hour. Your original body will be left behind, unconscious. You may perceive through your original body's senses by maintaining Concentration. If your original body is touched, you may roll Perception + Alertness to notice. You may spend an Action to end the possession early.
Stats: Any Actions you take will use the possessed creature’s Brawn, Dexterity, and Perception, but use your own Charisma, Intellect, and Abilities.
Gifts: You do not have access to any Gifts while you are possessing your target.
Death: If the host suffers an Injury, or is destroyed or incapacitated, you are evicted back into your own body. If the possession ends and your original body was killed or destroyed, you will die.
Eviction: You cannot force your host to take Actions which would violate their instinct for self-preservation (which includes engaging in Combat for any purpose other than self-defense or natural hunting); any attempt to do so will sever the connection and send you back into your own body. If you are forced out of the target's body prematurely, you must make a Trauma roll.
Targets with Body ratings higher than 10 require a Charisma + Animals roll resisted by the target’s Body. Kaiju and environment-scale targets are immune.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.
Who wouldn't want one of the mad scientist's famous implants? All it takes is a little time and a few terrifying experiments, and you too could be a better you!
Warning: not fully tested on humans. Risk of dry mouth, upset stomach, or lost limbs. Do not consult your doctor before signing the liability release.
Exert your Mind and spend eight hours. Select a Living or Animate target within arm's reach. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you cause a major Battle Scar instead of an augmentation. Your target must make a Trauma roll to reap the benefits of this Effect. They may choose to Resist the Effect and not make the roll. The target can easily Resist.
You may add one augmentation to your target. Each augmentation counts as a Battle Scar and can have exactly one of the following Effects:
The augmentations you provide are not outwardly visible nor obvious.
All it takes is a flick of your hair and a bat of your eyelashes, and you’ve got their attention.
Exert your Mind and spend an Action. A number of Sapient, Living targets within 50 feet who can perceive you through no greater than your Charisma rating are affected. Audiences or mobs with a singular focus count as one target. Roll Charisma + Performance at Difficulty 6. All affected targets may resist by rolling Mind at Difficulty 7.
If you succeed, the targets will keep their full attention focused on you for Contested Outcome in Rounds. They will automatically fail any rolls related to noticing anything other than you.
If you pass from their perception and they are unable to pursue you, the Effect ends. If they can follow you, they must do so for 2 Rounds or the Effect will end. The Effect ends early if the target is Injured or violence occurs nearby.
This does not affect the target’s opinion of you or their mood, and they may take any Actions while affected (including attacking), as long as that action centers on you. Fascinated targets cannot Concentrate.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.