#deckcombat
Explore tagged Tumblr posts
system-theory · 9 hours ago
Text
Tumblr media
Title:
🕷️ CyberCore: Black ICE — Lethal Security Programs of the Net
Txt2Image: cyberpunk ICE, lethal firewall AI, digital skull, glowing red code, defensive cyberspace avatar, dark grid, electrified code trap, neural burn, hacking danger, cyberbrain meltdown
[Role Playing System Messages]
In the deep Net, it's not guards or passwords that keep you out — it’s Black ICE. Short for Intrusion Countermeasures Electronics, Black ICE is the lethal class of autonomous security programs designed to kill, cripple, or fry a Netrunner’s mind.
Unlike standard Demons, Black ICE is aggressive, fast, and always hostile. It acts immediately, attacks first, and often ignores logic.
⚠️ What Makes Black ICE Deadly
Does Real Damage: Many Black ICE programs cause direct neural damage (to BODY or HIT POINTS)
Moves Fast: Acts at the start of the Net round, before players
Often Invisible: Requires Clairvoyance or Looking Glass to detect
Non-negotiable: You cannot reason with Black ICE
Triggers on Events: Accessing a node, failing a password, or even idling can launch ICE
🧠 Mechanics
Roll Black ICE Initiative: Always has +5 Initiative
Attacks via PROGRAM vs Netrunner's Interface
Damage type varies: Neural, Memory Wipe, Stun, Trace, or Crash
Each ICE has a set SP (Security Points) and must be defeated before passing
🔥 Black ICE Catalog (Sample)
Name Type SP Effect Hellhound Neural Shock 20 2D10 damage + trace to user location Pit Viper Stun 15 Paralyzes Netrunner for 1d4 turns Skullnet Lethal 25 3D10 damage + Interface lockout Brainwipe Memory Erasure 20 Deletes 1 random program per turn Tar Baby Trap 18 Prevents exit; triggers other ICE Snow Crash Multi-mode 30 Splits into two programs; each does 1D6 GhostTrace Spyware 10 Follows and relays all actions to Corp Slicer Speed Attack 20 2 attacks per round, 1D6 each Deathmask Psychoburn 25 3D6 damage, causes hallucinations for 1 hour Black Widow Boss-Class 40 5D6 damage, only found in ultra-secure grids
🧩 Defensive Tools vs Black ICE
Shield: Absorbs 1D6 of ICE damage
Reflector: 50% chance to bounce ICE attack
Spoof: Confuses ICE targeting
Scrub: Removes trace after ICE trigger
Clairvoyance / Looking Glass: Detects ICE before triggering
🎮 Black ICE Encounter Options:
1️⃣ Use Stealth & Clairvoyance — Detect and avoid the ICE before it sees you 2️⃣ Summon Demon to Tank — Let your AI companion take the hit 3️⃣ Deploy Shield and Fight — Out-code the killer 4️⃣ Run a Loop — Use Spoof to trick ICE into attacking its own 5️⃣ Trigger and Trap It — Bait the ICE into a trap node 6️⃣ Jack Out! — Save your brain, but leave the data 7️⃣ Trace It Back — Follow the ICE’s control signal to its source 8️⃣ Hijack the Node — Take over the server before it launches more ICE
0 notes
system-theory · 9 hours ago
Text
Tumblr media
Title:
👹 CyberCore: Netrunning Demons — Autonomous Agents of the Net
Txt2Image: cyberpunk AI, digital guardian, glowing demon in cyberspace, hacking spirit, neural grid entity, cyber witch, armored program avatar, neon data void, net architecture guardian
[Role Playing System Messages]
In the Net, Demons aren’t myth — they’re digital enforcers, autonomous AI constructs designed to protect, attack, or control sections of architecture. They can be loyal companions, rogue AI, or hostile defenses. Once summoned, they act semi-independently — like summoning spirits of code.
🧠 How Demons Work
Summoning: Load the Demon from your deck (takes 1 action).
Control: Use Interface to issue commands. Failing a control check causes erratic or hostile behavior.
Autonomy: Once commanded, Demons continue acting without further input.
Memory Use (MU): Demons use 8–15 MU, depending on power level.
Program Capacity: Each Demon can carry & use other software automatically.
🔥 Demon Types (Examples)
Name MU Programs Carried Traits Succubus II 8 4 programs Obedient, stealth-leaning Banshee 12 6 programs Sonic scream stuns enemy Netrunners Cerberus 15 6 programs Triple attacks vs intruders; aggressive Djinn 10 5 programs Balanced; supports and attacks Wraith 9 3 programs Gains +2 to Cloak and Invisibility Valkyrie 14 5 programs Protective — intercepts attacks against user Specter 11 4 programs Cannot be traced; uses Scrub on exit Behemoth 15 4 programs Tanks hits, high damage resistance
🎮 Example Demon Deployment:
You summon Succubus II, loading:
🧬 Clairvoyance — to detect hidden ICE
🛡 Shield — to absorb damage
🔨 Flatline — to disable an enemy Netrunner
⚡ Hijack — to seize control of a node
The Succubus obeys without question — unless damaged or confused. You must roll Interface vs. DV 15 to redirect it mid-combat.
⚠️ Risks of Demons:
Overload: Using multiple Demons at once strains the deck and can crash the Netrunner’s neuralware.
Rogue Behavior: If a Demon loses contact or is corrupted, it may act autonomously — or go full rogue AI.
Traceable Signature: High-grade Demons leave distinctive traces in the Net — a digital footprint for corp hunters.
🧩 Netrunning Choices:
1️⃣ Summon Cerberus — Launch an aggressive assault 2️⃣ Deploy Specter — Slip in and scrub your signature 3️⃣ Hack your Demon — Rewrite a stolen Demon to serve you 4️⃣ Abandon the Demon — Let it draw enemy ICE fire 5️⃣ Trap Demon Node — Reprogram a Demon to guard your safehouse 6️⃣ Negotiate with AI — Some Demons are semi-sentient. Can you cut a deal?
0 notes