Difference between revisions of "Elite Attack Decker"

From ShadowHaven Reloaded
Jump to navigation Jump to search
Line 12: Line 12:


==Standard Operating Procedure/Rules of Engagement==
==Standard Operating Procedure/Rules of Engagement==
A short description of how to use the grunt in a game.
This decker remains on standby in augmented reality during their shift. When a player is detected by a local host, they will take a dose of Psyche and then switch to hot-sim. Their job is to to data spike and link-lock the intruders. From there, they'll establish snoop before formatting the enemy's deck and set the condition that it will broadcast the user's position to the corp and GOD when they next connect to the matrix. After that, they will begin intermixing Cat's Paw Data spikes and Tantrum Data Spikes to prevent the enemy from breaking the connection. In the event that the connection is broken, the decker will begin tracing devices that the enemy received communications from as well as any that they sent messages to.
 
Their DR 3 deck will start with the attributes A: 6 S: 3(7) DP: 5 FW: 5
 
The decker will start combat with 6 programs loaded: Linklock, Hammer, Decryption, Smoke and Mirrors, Guard, and Configurator
After establishing a link-lock they will use configurator to swap out Decryption for Stealth, Hammer for Bootstrap, and switching Configurator to have their phase 3 loadout loaded.
 
After formatting the enemy device, or failing to format a technomancer, they will attempt to establish a snoop before using Configurator to swap Bootstrap for Cat's Paw, Stealth for Decryption, Smoke and Mirrors for , and Configurator set to their phase 2 loadout.
 
They'll attempt to trace the enemy until successful, and then begin alternating between Cat's Paw data spikes and Tantrum data spikes
 
Their different loadouts will look like:
 
    Phase 1: A:8(9) S:5(10) DP: 6 FW: 7(8) Lockdown, Hammer, Decryption, Guard, Smoke and Mirrors, Agent R6, Agent R6, Configurator(Phase 2), and PC(Encryption)
    Phase 2: A:5 S:8(14) DP: 6 FW: 7(8) Lockdown, Bootstrap, Stealth, Smoke and Mirrors, Exploit, Agent R6, Agent R6, and Configurator(Phase 3), and PC(Encryption)
    Phase 3: A:8(9) S:5(10) DP: 6 FW: 7(8) Lockdown, Cat's Paw/Tantrum, Decryption, Smoke and Mirrors, Guard, Agent R6, Agent R6, Configurator(Phase 2), and PC(Encryption)


==Stat Block==
==Stat Block==

Revision as of 02:01, 29 October 2024


Elite Attack Decker
Placeholder.png
Base MetatypeGrunt Metatype
Threat Level6
Typical FactionNPC faction if any
Thematics ApprovalNo
Mechanics ApprovalNo

Description

A short blurb describing the NPC grunt, what they do, and goals.

Standard Operating Procedure/Rules of Engagement

This decker remains on standby in augmented reality during their shift. When a player is detected by a local host, they will take a dose of Psyche and then switch to hot-sim. Their job is to to data spike and link-lock the intruders. From there, they'll establish snoop before formatting the enemy's deck and set the condition that it will broadcast the user's position to the corp and GOD when they next connect to the matrix. After that, they will begin intermixing Cat's Paw Data spikes and Tantrum Data Spikes to prevent the enemy from breaking the connection. In the event that the connection is broken, the decker will begin tracing devices that the enemy received communications from as well as any that they sent messages to.

Their DR 3 deck will start with the attributes A: 6 S: 3(7) DP: 5 FW: 5

The decker will start combat with 6 programs loaded: Linklock, Hammer, Decryption, Smoke and Mirrors, Guard, and Configurator After establishing a link-lock they will use configurator to swap out Decryption for Stealth, Hammer for Bootstrap, and switching Configurator to have their phase 3 loadout loaded.

After formatting the enemy device, or failing to format a technomancer, they will attempt to establish a snoop before using Configurator to swap Bootstrap for Cat's Paw, Stealth for Decryption, Smoke and Mirrors for , and Configurator set to their phase 2 loadout.

They'll attempt to trace the enemy until successful, and then begin alternating between Cat's Paw data spikes and Tantrum data spikes

Their different loadouts will look like:

   Phase 1: A:8(9) S:5(10) DP: 6 FW: 7(8) Lockdown, Hammer, Decryption, Guard, Smoke and Mirrors, Agent R6, Agent R6, Configurator(Phase 2), and PC(Encryption) 
   Phase 2: A:5 S:8(14) DP: 6 FW: 7(8) Lockdown, Bootstrap, Stealth, Smoke and Mirrors, Exploit, Agent R6, Agent R6, and Configurator(Phase 3), and PC(Encryption) 
   Phase 3: A:8(9) S:5(10) DP: 6 FW: 7(8) Lockdown, Cat's Paw/Tantrum, Decryption, Smoke and Mirrors, Guard, Agent R6, Agent R6, Configurator(Phase 2), and PC(Encryption)

Stat Block

Stat Block

B A R S W L I C Ess Special Att
5 3 4 3 6 6 6 6
Condition Monitor
Limits Physical , Mental , Social
Initiative
  • AR:
  • Cold-Sim VR:
  • Hot-Sim VR:
Qualities
Skills Cracking 10, Electronics 10, Negotiation 6, Con 6, Ettiquette 6
Knowledge Skills
Augmentations
  • Cyberears R1 - Antennae x3, Select sound filter
  • Datajack Plus R3
  • Nanohive, Soft (Neural Amp (Limbic))
  • Nanohive, Soft (Neural Amplifiers(Neocortical))
  • Cerebellum Booster R2
  • Cerebral Booster R3
  • Double Elastin
  • PuSHed
Spells
Adept Powers N/A
Gear 50900 nuyen left
  • All Programs except Cry Wolf
  • Shiawase Cyber-5 Add Module: Program Carrier (Encryption), Multidimensional Coprocessor
  • 10 Booster Cloud (Brute Force)
  • 10 Booster Cloud (Data Spike)
  • 10 Psyche
Weapons
Vehicles N/A