Difference between revisions of "SR5:Matrix Rules"
Adragon202 (talk | contribs) m (Adragon202 moved page SR5:Hacking Rules to SR5:Matrix Rules without leaving a redirect) |
MartianMonad (talk | contribs) |
||
| Line 23: | Line 23: | ||
!style="background:black;color:gold;"|ACTION | !style="background:black;color:gold;"|ACTION | ||
!style="background:black;color:gold;"|FUNCTION | !style="background:black;color:gold;"|FUNCTION | ||
| + | !style="background:black;color:gold;"|DICE POOL | ||
!style="background:black;color:gold;"|LIMIT | !style="background:black;color:gold;"|LIMIT | ||
!style="background:black;color:gold;"|MARKS | !style="background:black;color:gold;"|MARKS | ||
|- | |- | ||
| − | |Brute Force||Mark Manipulation||Attack||None | + | |Brute Force||Mark Manipulation||[[SR5:Matrix:Skills/Attributes#Cybercombat|Cybercombat]] + Logic vs. Willpower + [[SR5:Matrix:Skills/Attributes#Firewall|Firewall]]||Attack||None |
|- | |- | ||
| − | |Check Overwatch Score||Information Gathering||Sleaze||None | + | |Check Overwatch Score||Information Gathering||||Sleaze||None |
|- | |- | ||
| − | |Crack File||File Manipulation||Attack||1 | + | |Crack File||File Manipulation||||Attack||1 |
|- | |- | ||
| − | |Crash Program||Matrix Combat||Attack||1 | + | |Crash Program||Matrix Combat||||Attack||1 |
|- | |- | ||
| − | |Data Spike||Matrix Combat||Attack||None | + | |Data Spike||Matrix Combat||[[SR5:Matrix:Skills/Attributes#Cybercombat|Cybercombat]] + Logic vs. Intuition + [[SR5:Matrix:Skills/Attributes#Firewall|Firewall]]||Attack||None |
|- | |- | ||
| − | |Disarm Data Bomb||File Manipulation||Firewall||None | + | |Disarm Data Bomb||File Manipulation||||Firewall||None |
|- | |- | ||
| − | |Edit File||File Manipulation||Data Processing||1 | + | |Edit File||File Manipulation||||Data Processing||1 |
|- | |- | ||
| − | |Enter/Exit Host||Misc||Data Processing||1 | + | |Enter/Exit Host||Misc||||Data Processing||1 |
|- | |- | ||
| − | |Erase Mark||Mark Manipulation||Attack||Special | + | |Erase Mark||Mark Manipulation||||Attack||Special |
|- | |- | ||
| − | |Erase Matrix Signature||Mark Manipulation||Attack||None | + | |Erase Matrix Signature||Mark Manipulation||||Attack||None |
|- | |- | ||
| − | |Format Device||Device Manipulation||Sleaze||3 | + | |Format Device||Device Manipulation||||Sleaze||3 |
|- | |- | ||
| − | |Grid-Hop||Misc||Data Processing||None | + | |Grid-Hop||Misc||||Data Processing||None |
|- | |- | ||
| − | |Hack on the Fly||Mark Manipulation||Sleaze||None | + | |Hack on the Fly||Mark Manipulation||[[SR5:Matrix:Skills/Attributes#Hacking|Hacking]] + Logic vs. Intuition + [[SR5:Matrix:Skills/Attributes#Firewall|Firewall]]||Sleaze||None |
|- | |- | ||
| − | |Hide||Misc||Sleaze||0 | + | |Hide||Misc||||Sleaze||0 |
|- | |- | ||
| − | |Jam Signals||Misc||Attack||Owner | + | |Jam Signals||Misc||||Attack||Owner |
|- | |- | ||
| − | |Jump Into Rigged Device||Misc||Data Processing||3 | + | |Jump Into Rigged Device||Misc||||Data Processing||3 |
|- | |- | ||
| − | |Matrix Perception||Information Gathering||Data Processing||None | + | |Matrix Perception||Information Gathering||||Data Processing||None |
|- | |- | ||
| − | |Reboot Device||Device Manipulation||Data Processing||3 | + | |Reboot Device||Device Manipulation||||Data Processing||3 |
|- | |- | ||
| − | |Set Data Bomb||File Manipulation||Sleaze||1 | + | |Set Data Bomb||File Manipulation||||Sleaze||1 |
|- | |- | ||
| − | |Snoop||Information Gathering||Sleaze||1 | + | |Snoop||Information Gathering||||Sleaze||1 |
|- | |- | ||
| − | |Spoof Command||Device Manipulation||Sleaze||1 | + | |Spoof Command||Device Manipulation||||Sleaze||1 |
|- | |- | ||
| − | |Trace Icon||Information Gathering||Data Processing||2 | + | |Trace Icon||Information Gathering||||Data Processing||2 |
|} | |} | ||
|- | |- | ||
Revision as of 16:57, 26 April 2017
| 5th Edition Rules |
|---|
| Basics // Combat // Magic // Matrix // Driving // Character Creation |
| Basics | Skills/Attributes | Actions | Jargon | Cyberdecks | Programs | How To | Complex Forms | Echoes | Sprites | Sprite Powers | IC |
|---|
|
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
*Control Device may or may not use Data Processing as its limit | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Technomancer Actions
|
|