Hack Mode

1
This Artifact allows you to issue commands to technological devices.
Used by Henry Callahan, Created by DroppingCyber.
On Legendary Artifact Tech-Mage's Best Buddy.
(When activating this Effect, it is obvious you are interacting with the target. You must actively and obviously be using up Batteries. You must use this Artifact obviously when activating this Effect.)

The Contractor would flip the back of the cellphone and pop the cover door open, revealing the slot for a good sized battery, that he just replaces with a new one. The door is closed as he would quickly boot it up and start to use it, the screen glowing yellow as it connects to the nearby device, the screen going dimmer and dimmer until finally the hack is complete.


Exert your Mind and spend 1 minute. Select a Device within 300 feet. Does not work on Alien technology. You must use up Batteries in order to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Every hack you make leaves behind Glowing Yellow Screen in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

Anyone who touches this Artifact will notice it warping their mind and may drop it. If they choose to hold or use it, they immediately receive the following Trauma: Trypanophobia. If they lose possession of this Artifact, the Trauma heals over the course of the next day.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Community Hack Gifts

Kyle is not fully human. He doesn't quite know it yet, but a part of his brain's been replaced with cybernetics and electronics. Using an antennae located in his head, he is able to subconsciously operate these bio-technical electronics responsible for interfacing with computer systems.

Hates cops, hates the system, smokes pot - he's a real cyberpunk now, ain't he?

Exert your Mind and spend 1 minute. Select a Device within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

the arm looks very much non human, and mechanical, like the arm Tay lost and the stone left behind is modeled after the artifact that allows time travel. This all works do to special parts of the circuit that try to interact with the arm, but instead as a fail-safe make the holographic arm temporarily. This power merely gives a means to interact with the circuit board to hack a system.

Exert your Mind and spend 1 minute to activate. Select a Computer within arm's reach. Can be used on Alien technology. You must actively and obviously use Modified Circuit Board to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.

Every hack you make leaves behind a shining pink stone in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.

Everything has mana, each has a specific unique frequency in sapiens mana is their soul everything reveals themselves in their mana wether they know it or not.

Increase your sacrificial Injury's Severity by 1 and spend 2 Actions. Investigate an area with a radius of up to 100 feet You must actively and obviously use staff, stave, wand. to activate this Effect. At the end of your investigation, roll Intellect + Occult at Difficulty 6.

You learn the following information about the area:

  • You learn where exactly creatures and people live within the area, and what sorts of creatures they are.
  • You learn You detect any areas of social/cultural importance or significance (heritage sites, memorials, ritual sites)
The quality and specificity of information gained depends on your Outcome.

If you do not have a sacrificial Injury when you activate this Effect, take a new Severity-1 Injury.

You cannot investigate the same area more than once per day.

  • The sacrificial Injury received from activating this Effect cannot be prevented by any means or healed before 1 day has passed. It is shared with all Effects that use sacrifice. This Injury does not requires Stabilization or cause Battle Scars when it becomes Severe.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Spend 2 Actions. Select a Device within arm's reach. Can be used on Alien technology. Roll Charisma + Occult, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Every hack you make leaves behind Holy Symbols in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 1.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Exert your Mind and spend 1 minute to activate. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a glitchy laughing skull in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Stock Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.