Difference between revisions of "SR5:Matrix Rules"
Adragon202 (talk | contribs) m (Adragon202 moved page SR5:Hacking Rules to SR5:Matrix Rules without leaving a redirect) |
MartianMonad (talk | contribs) |
||
Line 23: | Line 23: | ||
!style="background:black;color:gold;"|ACTION | !style="background:black;color:gold;"|ACTION | ||
!style="background:black;color:gold;"|FUNCTION | !style="background:black;color:gold;"|FUNCTION | ||
+ | !style="background:black;color:gold;"|DICE POOL | ||
!style="background:black;color:gold;"|LIMIT | !style="background:black;color:gold;"|LIMIT | ||
!style="background:black;color:gold;"|MARKS | !style="background:black;color:gold;"|MARKS | ||
|- | |- | ||
− | |Brute Force||Mark Manipulation||Attack||None | + | |Brute Force||Mark Manipulation||[[SR5:Matrix:Skills/Attributes#Cybercombat|Cybercombat]] + Logic vs. Willpower + [[SR5:Matrix:Skills/Attributes#Firewall|Firewall]]||Attack||None |
|- | |- | ||
− | |Check Overwatch Score||Information Gathering||Sleaze||None | + | |Check Overwatch Score||Information Gathering||||Sleaze||None |
|- | |- | ||
− | |Crack File||File Manipulation||Attack||1 | + | |Crack File||File Manipulation||||Attack||1 |
|- | |- | ||
− | |Crash Program||Matrix Combat||Attack||1 | + | |Crash Program||Matrix Combat||||Attack||1 |
|- | |- | ||
− | |Data Spike||Matrix Combat||Attack||None | + | |Data Spike||Matrix Combat||[[SR5:Matrix:Skills/Attributes#Cybercombat|Cybercombat]] + Logic vs. Intuition + [[SR5:Matrix:Skills/Attributes#Firewall|Firewall]]||Attack||None |
|- | |- | ||
− | |Disarm Data Bomb||File Manipulation||Firewall||None | + | |Disarm Data Bomb||File Manipulation||||Firewall||None |
|- | |- | ||
− | |Edit File||File Manipulation||Data Processing||1 | + | |Edit File||File Manipulation||||Data Processing||1 |
|- | |- | ||
− | |Enter/Exit Host||Misc||Data Processing||1 | + | |Enter/Exit Host||Misc||||Data Processing||1 |
|- | |- | ||
− | |Erase Mark||Mark Manipulation||Attack||Special | + | |Erase Mark||Mark Manipulation||||Attack||Special |
|- | |- | ||
− | |Erase Matrix Signature||Mark Manipulation||Attack||None | + | |Erase Matrix Signature||Mark Manipulation||||Attack||None |
|- | |- | ||
− | |Format Device||Device Manipulation||Sleaze||3 | + | |Format Device||Device Manipulation||||Sleaze||3 |
|- | |- | ||
− | |Grid-Hop||Misc||Data Processing||None | + | |Grid-Hop||Misc||||Data Processing||None |
|- | |- | ||
− | |Hack on the Fly||Mark Manipulation||Sleaze||None | + | |Hack on the Fly||Mark Manipulation||[[SR5:Matrix:Skills/Attributes#Hacking|Hacking]] + Logic vs. Intuition + [[SR5:Matrix:Skills/Attributes#Firewall|Firewall]]||Sleaze||None |
|- | |- | ||
− | |Hide||Misc||Sleaze||0 | + | |Hide||Misc||||Sleaze||0 |
|- | |- | ||
− | |Jam Signals||Misc||Attack||Owner | + | |Jam Signals||Misc||||Attack||Owner |
|- | |- | ||
− | |Jump Into Rigged Device||Misc||Data Processing||3 | + | |Jump Into Rigged Device||Misc||||Data Processing||3 |
|- | |- | ||
− | |Matrix Perception||Information Gathering||Data Processing||None | + | |Matrix Perception||Information Gathering||||Data Processing||None |
|- | |- | ||
− | |Reboot Device||Device Manipulation||Data Processing||3 | + | |Reboot Device||Device Manipulation||||Data Processing||3 |
|- | |- | ||
− | |Set Data Bomb||File Manipulation||Sleaze||1 | + | |Set Data Bomb||File Manipulation||||Sleaze||1 |
|- | |- | ||
− | |Snoop||Information Gathering||Sleaze||1 | + | |Snoop||Information Gathering||||Sleaze||1 |
|- | |- | ||
− | |Spoof Command||Device Manipulation||Sleaze||1 | + | |Spoof Command||Device Manipulation||||Sleaze||1 |
|- | |- | ||
− | |Trace Icon||Information Gathering||Data Processing||2 | + | |Trace Icon||Information Gathering||||Data Processing||2 |
|} | |} | ||
|- | |- |
Revision as of 16:57, 26 April 2017
5th Edition Rules |
---|
Basics // Combat // Magic // Matrix // Driving // Character Creation |
Basics | Skills/Attributes | Actions | Jargon | Cyberdecks | Programs | How To | Complex Forms | Echoes | Sprites | Sprite Powers | IC |
---|
|
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
*Control Device may or may not use Data Processing as its limit | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Technomancer Actions
|
|