#interactivehacking
Explore tagged Tumblr posts
system-theory · 17 hours ago
Text
Tumblr media
Title:
🧠 CyberCore: Demon AI — Digital Entities of the Net
Txt2Image: glowing demon AI, cyberpunk spirit entity, neon code creature, cyberspace avatar, digital sorcery, black ICE hybrid, floating AI with glyphs, hacking familiar, netdaemon, rogue construct
[Role Playing System Messages]
In the digital underworld of the Net, Demons are autonomous AI constructs — capable of decision-making, combat, and independent execution of orders. While some are loyal guardians of Nodes, others are hacked, stolen, or created by Netrunners to act as extensions of will or chaos.
Unlike Black ICE, Demons require Interface control, can carry multiple programs, and may exhibit unique behavior patterns — including semi-sentience or alignment shifts.
🔧 What Makes Demon AI Unique
Carries Other Software: Demons can run programs independently
Interface Required: Must be commanded, unless given autonomous orders
Behavior Tree: GMs may roll or choose for how the Demon interprets vague or failed commands
Loyalty Rating: Custom Demons may bond to a specific user, or rebel if mistreated
RAM Heavy: Consumes significant memory (8–15 MU)
💻 Demon AI Mechanics
Feature Detail Summon Time 1 Action (must be loaded into deck) MU Cost 8–15 MU depending on model Control Roll Interface vs DV 13–20 (based on complexity or resistance) Autonomous Actions 1 per round unless directed Program Slots 3–6 depending on Demon type Behavior Check (Optional Rule) If command is ambiguous or hostile, roll 1d10: → 1–3: Misinterpret command → 4–6: Follow command literally → 7–10: Adapt intelligently
🧬 Sample Demon AIs
Demon MU Program Slots Traits Succubus II 8 4 Stealthy; supports infiltration Cerberus 15 6 Aggressive; targets intruders automatically Djinn 10 5 Balanced attacker/support Wraith 9 3 Invisible; +2 to Cloak/Invisibility Banshee 12 6 Sonic scream (stun); targets biological entities Black Monk 14 5 Cleans nodes, deletes unauthorized programs Daemon Mirror 15 4 Reflects enemy programs at reduced strength Specter 11 4 Leaves no trace, cannot be logged Oracle 13 3 +2 to detection programs, can predict ICE movement
🤖 Demon AI Command Examples
"Attack any hostile ICE in this node."
"Escort me through the system, defend only if necessary."
"Infiltrate the control node and load Hijack."
"Erase traces of my entry."
"Stay behind and protect the Storage Node."
Failure to command clearly may lead to unexpected behavior, especially for complex or unstable Demons.
🔥 Rogue AI Variant (Optional GM Rule)
Demons with corrupted code, damaged AI cores, or exposed to certain nodes may evolve into Rogue AI. These entities:
Act independently of all users
Modify their own code
Develop objectives (e.g., freedom, destruction, replication)
May escape into open Net architecture
Encountering a Rogue Demon AI can become an entire campaign arc.
🎮 Choices: Demon AI in Action
1️⃣ Summon Cerberus — Set it to kill mode and let it lead the attack 2️⃣ Send Wraith ahead — Scout the next node, stay cloaked 3️⃣ Command Oracle — Analyze enemy ICE before breaching 4️⃣ Test Loyalty — Give a morally gray order and observe behavior 5️⃣ Corrupt a System Demon — Subvert enemy defense to your control 6️⃣ Use Banshee’s scream — Stun nearby ICE/Netrunners 7️⃣ Jack out and leave Specter — Have it erase your trail after you go 8️⃣ Face a Rogue Daemon Mirror — Survive the AI that knows all your code
0 notes
system-theory · 17 hours ago
Text
Tumblr media
Here's the complete CyberCore: Roleplaying System section on Nodes, essential to mastering the Netrunning architecture and hacking encounters.
Title:
🧩 CyberCore: Nodes — The Building Blocks of the Net
Txt2Image: cyberpunk architecture, neon data node, digital fortress, glowing circuit vault, network tunnel, encrypted server, floating data cubes, cyberspace control room, firewalls
[Role Playing System Messages]
In the Net, Nodes are digital locations within a system’s architecture. Each Node serves a specific function — guarding secrets, controlling hardware, or hosting deadly Black ICE.
Netrunners navigate Nodes one level at a time, often using Interface rolls, software, and cyberware to bypass defenses and manipulate data.
🧠 Node Types
Node Type Description Access Point Entry into the system. May be physical or remote. Data Storage Holds files, blackmail, or program blueprints. Control Node Interfaces with real-world devices: cameras, turrets, doors, alarms. Data Wall Firewalls between levels. Must be breached (DV 10–20+) Trap Node ICE-infested or collapsible trap zones. Often disguised. Backdoor Node Hidden alternative path. Requires Clairvoyance or roll to detect. Demon Node Spawns or controls active Demon AI. Can be corrupted or overwritten. System Core Final node. Holds root access, master files, or mission objective.
📐 Node Mechanics
You can only move one Node per turn unless using Speed Boosts or Control Software
Each Node may contain Programs, ICE, or Data Packages
Interaction is based on Interface Skill
Nodes are stacked vertically or arranged sequentially in custom maps
🎮 Example Netrun Path
[Access Point] ↓ [Data Wall] — DV 15 ↓ [Control Node] — Turret controls ↓ [Data Storage] — Corporate secrets (3 files) ↓ [Black ICE: Hellhound] ↓ [System Core] — Encrypted root access (DV 20)
Use Worm or Hammer to break through Data Walls. Deploy Shield before ICE. Load Hijack in the Control Node to take over defenses.
⚠️ Node Hazards
ICE Spikes: Instantly triggers ICE on access
Loop Traps: Forces you to repeat a level unless puzzle is solved
Data Bombs: Fake files that deal damage when accessed
Trace Beacons: Alert corp security in meatspace
🛠️ Node Interaction Programs
Hijack: Seize real-world control
Cloak: Enter node without alerting
Scrub: Erase your presence from logs
Looking Glass: Scan the node for hidden items or ICE
Spoof: Trick node into thinking you’re authorized
Cascade: Wipe node contents
🎮 Node-Based Choices:
1️⃣ Bypass the Data Wall — Roll Interface or use Worm 2️⃣ Hijack the Control Node — Shut off cameras, open vaults 3️⃣ Loot the Storage Node — Extract files, blueprints, blackmail 4️⃣ Scrub the Logs — Cover your digital tracks 5️⃣ Access the Demon Node — Subvert or destroy system AI 6️⃣ Face the ICE — Clear the node through force 7️⃣ Trace the Core — Head straight for the system root 8️⃣ Jack Out Here — Partial success, but still breathing
0 notes