#digitalentity
Explore tagged Tumblr posts
Text
👹 Demon AI Profile: Succubus II
Txt2Image: cyberpunk digital succubus, glowing red code avatar, stealth AI, demon in neon cyberspace, holographic female entity, cyber deck familiar, hacker’s assistant, ghostlike hacker AI
🔍 Overview
"She whispers through the data fog. You won’t hear her coming until your firewalls are in ashes."
Succubus II is a stealth-optimized Demon AI used by Netrunners for infiltration, soft defense, and utility. It's valued for its low memory load, adaptive obedience, and its utility in low-profile data raids or subtle sabotage missions.
🧠 Stats
Attribute Value Memory Use 8 MU Program Slots 4 Behavior Default Servitor (obeys commands literally unless customized) Speed 1 action/round Defense SP 10 (cyber defense only) Interface Control DV 13 (to issue new command mid-run)
🎛️ Typical Loadout Examples
Slot Program Description 1 Clairvoyance Reveals hidden ICE and Nodes 2 Shield Absorbs incoming program damage 3 Flatline Lethal attack, 3D6 neural damage 4 Hijack Seize control of real-world devices via Control Node
The Succubus can operate all four programs autonomously while following pre-assigned logic (e.g., “Protect me,” “Stalk next node,” “Defend Node 3”).
💬 Behavior Programming Options
When summoned, you can assign a behavior protocol:
Stalk & Scan: Moves 1 node ahead and uses Clairvoyance
Guardian Ghost: Remains on current node, automatically Shielding user
Auto-Snare: Uses Flatline against first enemy detected
Saboteur Mode: Seeks out Control Node and executes Hijack
⚠️ Risks & Vulnerabilities
Can be overloaded by Black ICE faster than heavier Demons
Literal interpretation of commands can cause mission failure (e.g., "Kill everything" triggers chaos)
If corrupted, may turn rogue and hide in your own memory space
🎮 Gameplay Interaction Choices
1️⃣ Summon Succubus II — Deploy with current program loadout 2️⃣ Reprogram Mid-Run — Roll Interface vs DV 13 to change behavior 3️⃣ Let It Lead — Allow Succubus II to enter next Node first 4️⃣ Assign to Control Node — Use Hijack to seize local defenses 5️⃣ Cloak It — Load Invisibility on Succubus II to let it stalk ICE 6️⃣ Sacrifice It — Send it to absorb a Black ICE first strike 7️⃣ Upgrade to Succubus III — (Custom campaign option) add AI learning memory
#cybercore#succubusII#netrunnerdemon#digitalentity#cyberpunkAI#stealthdemon#interactiveRPG#decktool#netcombat#daemonprofile
0 notes
Text
Bad and naughty apps get put in time out
3 notes
·
View notes
Photo

"Translated." #DigitalEntities https://www.instagram.com/p/CEjAsSpneeG/?igshid=q2x3ee4b9gwl
0 notes
Photo

Expansion Rules Cover Art roughed in! So this is hard to look at now, and might get a hell of a lot worse as I attempt to paint this in oils. I’ve tried to learn to oil paint on two other occasions in my illustration career and failed, but gonna give them another go this weekend. I aim to post here often so wish me luck! www.mutantepoch.com #bookcover #illustration #art #wip #rpg #ttrpg #mutantepoch #postapocalyptic #mutant #epoch #mutants #tabletoprpg #game #gaming #gamer #gameart #rpgart #outlandsystem #outlandarts #expansionrules #gameart #mutirg #digitalentity #abomination #plantoid #ai #vatbrain #skull https://www.instagram.com/p/B1dcsb3BJzR/?igshid=19nj31dq2uznq
#bookcover#illustration#art#wip#rpg#ttrpg#mutantepoch#postapocalyptic#mutant#epoch#mutants#tabletoprpg#game#gaming#gamer#gameart#rpgart#outlandsystem#outlandarts#expansionrules#mutirg#digitalentity#abomination#plantoid#ai#vatbrain#skull
0 notes
Text
Ya disponibles los primeros retrocompatibles de Xbox One en 2019:

Recuerda que la retrocompatibilidad funciona tanto fisica, como digitalente, si tienes una copia física de xbox 360, basa con introducir el disco en tu Xox One. Si tienes una copia digital, puedes volverlo a descargar desde tu Xbox One.
Estos son los nuevos videojuegos disponibes:
Rayman: Raving Rabbids

Battlestation Pacific

FUEL

0 notes
Photo

Lady Gital
#DigitalEntity 2016
http://fistjoking.tumblr.com
3 notes
·
View notes
Video
instagram
#digitalentity at #arselectronica #zen #garden (presso Linz, Altstadt, Österreich)
0 notes
Text
Title:
🧠 CyberCore: Demon AI — Digital Entities of the Net
Txt2Image: glowing demon AI, cyberpunk spirit entity, neon code creature, cyberspace avatar, digital sorcery, black ICE hybrid, floating AI with glyphs, hacking familiar, netdaemon, rogue construct
[Role Playing System Messages]
In the digital underworld of the Net, Demons are autonomous AI constructs — capable of decision-making, combat, and independent execution of orders. While some are loyal guardians of Nodes, others are hacked, stolen, or created by Netrunners to act as extensions of will or chaos.
Unlike Black ICE, Demons require Interface control, can carry multiple programs, and may exhibit unique behavior patterns — including semi-sentience or alignment shifts.
🔧 What Makes Demon AI Unique
Carries Other Software: Demons can run programs independently
Interface Required: Must be commanded, unless given autonomous orders
Behavior Tree: GMs may roll or choose for how the Demon interprets vague or failed commands
Loyalty Rating: Custom Demons may bond to a specific user, or rebel if mistreated
RAM Heavy: Consumes significant memory (8–15 MU)
💻 Demon AI Mechanics
Feature Detail Summon Time 1 Action (must be loaded into deck) MU Cost 8–15 MU depending on model Control Roll Interface vs DV 13–20 (based on complexity or resistance) Autonomous Actions 1 per round unless directed Program Slots 3–6 depending on Demon type Behavior Check (Optional Rule) If command is ambiguous or hostile, roll 1d10: → 1–3: Misinterpret command → 4–6: Follow command literally → 7–10: Adapt intelligently
🧬 Sample Demon AIs
Demon MU Program Slots Traits Succubus II 8 4 Stealthy; supports infiltration Cerberus 15 6 Aggressive; targets intruders automatically Djinn 10 5 Balanced attacker/support Wraith 9 3 Invisible; +2 to Cloak/Invisibility Banshee 12 6 Sonic scream (stun); targets biological entities Black Monk 14 5 Cleans nodes, deletes unauthorized programs Daemon Mirror 15 4 Reflects enemy programs at reduced strength Specter 11 4 Leaves no trace, cannot be logged Oracle 13 3 +2 to detection programs, can predict ICE movement
🤖 Demon AI Command Examples
"Attack any hostile ICE in this node."
"Escort me through the system, defend only if necessary."
"Infiltrate the control node and load Hijack."
"Erase traces of my entry."
"Stay behind and protect the Storage Node."
Failure to command clearly may lead to unexpected behavior, especially for complex or unstable Demons.
🔥 Rogue AI Variant (Optional GM Rule)
Demons with corrupted code, damaged AI cores, or exposed to certain nodes may evolve into Rogue AI. These entities:
Act independently of all users
Modify their own code
Develop objectives (e.g., freedom, destruction, replication)
May escape into open Net architecture
Encountering a Rogue Demon AI can become an entire campaign arc.
🎮 Choices: Demon AI in Action
1️⃣ Summon Cerberus — Set it to kill mode and let it lead the attack 2️⃣ Send Wraith ahead — Scout the next node, stay cloaked 3️⃣ Command Oracle — Analyze enemy ICE before breaching 4️⃣ Test Loyalty — Give a morally gray order and observe behavior 5️⃣ Corrupt a System Demon — Subvert enemy defense to your control 6️⃣ Use Banshee’s scream — Stun nearby ICE/Netrunners 7️⃣ Jack out and leave Specter — Have it erase your trail after you go 8️⃣ Face a Rogue Daemon Mirror — Survive the AI that knows all your code
#cybercore#demonAI#netrunning#cyberpunk#autonomousagent#blackicehybrid#digitalentity#rogueai#interactivehacking#neonhorrors
0 notes
Photo

"we rode through an endless void, upon ember waves we drifted." #SolarWinds #DigitalEntities
0 notes
Link
#DigitalEntity 2016 on Linkedin
0 notes
Video
instagram
Le teste scatole #bigface_ars #arselectronica #digitalentity (presso Postcity Linz)
0 notes