When he uses disability, the disturbing effect activates as these little mice come out of his own shadow and crawl onto his shoulder, ready to do whatever he asks
Spend an Action. Select a Location within 10 feet.
You place a ward,. You can perceive with all your senses through the ward as though you were standing at its location. This Artifact may have at most 1 wards active at once.
The ward requires Concentration to monitor, though it will remain active until you deactivate it. The ward can be discovered if someone knows what they are looking for, but is otherwise inconspicuous and cannot be identified as a ward.
You may destroy the Ward to activate one Investigate Individual, >Object, or Area Effect as though you were standing at its location.
Your Ward records all activity it observes, regardless of whether or not you are actively monitoring it. This recording can be played back and referenced later.
You may communicate through your ward, though doing so will reveal its presence.
Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see Blood begins to pour out of his eyes as it travels down his neck then it goes up his arm, and it goes to his palm and then forms a little mouse out of his blood, and then the mouse becomes solid, black shadow and then the little mouse‘s eyes glow red to signify that he has just been given life.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 1.
Anyone who touches this Artifact will notice it warping their mind and may drop it. If they choose to hold or use it, they immediately receive the following Trauma: compulsion. If they lose possession of this Artifact, the Trauma heals over the course of the next day.
A series of neon-green numbers and letters flood rapidly down the lenses of the sunglasses. This jumbled macro-condensed code is then simplified and ‘gameified’ for the user’s ease of access. Upon completion, the Elite Eyewear’s then provides a digital display and interface — allowing for access and manipulation of the hacked device.
Hacking is freaking hard… So why not make it easier? At the end of the day, I’m a gamer — and with this power, even the most complicated system is like putty in my hands… as long as it’s within range, anyways. Sure, it might take a minute but hacking is freaking hard, OK?? Give me a break…
Exert your Mind and spend 1 minute. Select a Device within 300 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
As an obsidian dust cloud is expelled from the stone towards the target. It rapidly solidifies into a display of obsedian skelletons . As attacks are absorbed these corpses will retaliate as a mob trying to bring the attacker to their dead realm while turning into bleeding skeletons.
A denizen of xibalba gifts the souls of those who died or where buried near by an obsidian body on earth. This body is to be used to protect a target and take out their anger out on the attacker. Despite the bodies not being flesh they bleed possibly making the dead relive their last moments one earth causing them to scream in pain. As old habits die had specially after serving Chamiabac and Chamiaholom.
Expend a point of Battery and spend an Action or Reaction. Select a Animate target within 20 feet. Roll Charisma + Influence at Difficulty 6.
If you succeed, you create a barrier around your target, which absorbs the next Outcome +2 Damage. Any Damage absorbed by the barrier is reflected back to the attacker, up to a maximum of 2. Their Armor applies in full. The Damage reduction from the barrier is applied before Armor. This Artifact may only have 1 active barrier at a time.
You must maintain Concentration while using this Effect. The barrier will fall if you are interrupted, or if it absorbs the full amount of Damage. When a barrier falls, you cannot use this Effect again for a minimum of 2 Rounds.
This Artifact can be used as a handgun. It is roughly the same size as a handgun and just as difficult to conceal.
Attack by rolling Dexterity + Firearms, Difficulty 6. Successful attacks deal Contested Outcome +4 Weapon Damage.
You also gain the following effects:
Its a grenade launcher.
Why specifically a Milkor MGL Grenade Launcher? You see the MGL was made in the Rainbow Nation herself, South Africa. And Boets is very fond of his country.
This Artifact can be used as a crossbow. It is roughly the same size as a crossbow and just as difficult to conceal.
Attack by rolling Dexterity + Firearms, Difficulty 6. Successful attacks deal Contested Outcome +2 Weapon Damage. Attacks do not require a successful called shot to do damage.
You also gain the following effects:
By placing the Arm of Advancement's 'palm' against the surface of a hackable device, the hand will initiate a wireless data transfer, allowing me to easily bypass most difficult security measures, communicate with the device, and give it commands that initiate when I desire.
Spend 1 minute. Select a Computer within arm's reach. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.
This Gift's Cost is capped at 2 and cannot be increased further.
The 255TE "Lancer" Rife fires an extremely deadly spike of plasma at its targets. It comes standard with a volume control, allowing the soldier to mute its normally fearsome lightning crack report for stealth missions. When not in use, it can collapse into a small metal disk that can fit into any utility belt.
This Artifact can be used as a rifle. It is roughly the same size as a rifle but can be collapsed into a metallic disk and concealed. Collapsing or expanding it costs a Quick Action.
Attack by rolling Dexterity + Firearms, Difficulty 6. Successful attacks deal Contested Outcome +5 Weapon Damage.
You also gain the following effects:
When Winter Fang's glittering string is drawn, an ice arrow crystalizes nocked and ready to fire. These ice arrows melt quickly after piercing their foes, leaving deadly wounds instead of evidence.
This Artifact can be used as a bow. It is roughly at least twice as large as a bow and cannot be concealed on your person or disassembled for storage.
Attack by rolling Dexterity + Athletics, Difficulty 6. Successful attacks deal Contested Outcome +3 Weapon Damage. Attacks do not require a successful called shot to do damage.
You also gain the following effects:
The Predatory Raiment has a cloak feature that allows its owner to hide themselves and their equipment with active camouflage. When viewed, they look like a slightly shifted and shimmering version of the surrounding environment.
You gain the following benefits as long as you are not at all wet and you are wearing this Artifact.
You and everything you are carrying is obscured in one of the following manners. You may Spend an Action to change the way in which you're concealed.
While this Effect is active, any Effect that would obscure you or your equipment specifically from other, additional senses fails automatically.
If someone discovers you, this Effect will not help you hide from them for the next minute. This Effect does not end early when you activate an obvious Effect, attack, or receive an Injury.
The lightning bracers can be activated to summon a thunderbolt into the wearer's hand. Throwing these thunderbolts makes an incredibly loud boom. Once a thunderbolt is in hand, the wearer can throw as many as they wish. The electricity from these bolts will jump between nearby targets.
This Artifact produces ephemeral projectiles that can be used as a javelin.
Attack by rolling Brawn + Athletics, Difficulty 6. Successful attacks deal Contested Outcome +3 Weapon Damage.
You also gain the following effects:
The spy can do up their passport to appear as any valid form of identification.
This Artifact can change its appearance. When not transformed, it is roughly the same size as a passport but can be collapsed into a wallet and concealed. Collapsing or expanding it costs a Quick Action.
Spend a Quick Action to activate. This Artifact changes its appearance into a chosen Object. This lasts until you decide to end the Effect, which may be done as a Free Action.
The new object's appearance can mimic specific items (such as a particular painting, a certain person’s ID, etc), but must be of a similar size and weight to this Artifact.
The new appearance is illusory; it will hold up to scrutiny, but its composition is not altered and it gains no new functionality. Any attempt to use it for a function which it cannot perform (for instance, making bread look like a knife and then trying to stab someone) will cause the illusion to fail or allow a Perception check to see through the illusion, at the GM's discretion.
When used as identification and scanned, the scanner will act appropriately and bring up appropriate generic information. Further searches for the identity in the computer will turn up no results. This will not open security doors on its own.