Difference between revisions of "SR5:Matrix:Complex Forms"
(Merge Kill Code forms into alphabetical listing) |
(Put forms under an All Streams supersection so the stream specific forms can be added to their own section) |
||
Line 2: | Line 2: | ||
{{SR5:Matrix Rules Navigation}} | {{SR5:Matrix Rules Navigation}} | ||
− | ==Arc Feedback== | + | ==All Streams== |
+ | |||
+ | ===Arc Feedback=== | ||
;Target:Icon | ;Target:Icon | ||
;Duration:S | ;Duration:S | ||
Line 24: | Line 26: | ||
;Source:Kill Code | ;Source:Kill Code | ||
− | ==Bootleg Program== | + | ===Bootleg Program=== |
;Target:Device | ;Target:Device | ||
;Duration:I | ;Duration:I | ||
Line 42: | Line 44: | ||
;Source:Kill Code | ;Source:Kill Code | ||
− | ==Cleaner== | + | ===Cleaner=== |
;Target:Persona | ;Target:Persona | ||
;Duration:S | ;Duration:S | ||
Line 54: | Line 56: | ||
;Source:Core | ;Source:Core | ||
− | ==Coriolis== | + | ===Coriolis=== |
;Target:Persona | ;Target:Persona | ||
;Duration:E (5, 24 hours) | ;Duration:E (5, 24 hours) | ||
Line 60: | Line 62: | ||
;Source:Chrome Flesh | ;Source:Chrome Flesh | ||
− | ==Derezz== | + | ===Derezz=== |
;Target:Persona | ;Target:Persona | ||
;Duration:I | ;Duration:I | ||
Line 76: | Line 78: | ||
;Source:Data Trails | ;Source:Data Trails | ||
− | ==Diffusion of [Matrix Attribute]== | + | ===Diffusion of [Matrix Attribute]=== |
;Target:Device | ;Target:Device | ||
;Duration:S | ;Duration:S | ||
Line 89: | Line 91: | ||
;Source:Core | ;Source:Core | ||
− | ==Editor== | + | ===Editor=== |
;Target:File | ;Target:File | ||
;Duration:P | ;Duration:P | ||
Line 103: | Line 105: | ||
;Source:Core | ;Source:Core | ||
− | ==FAQ== | + | ===FAQ=== |
;Target:Device | ;Target:Device | ||
;Duration:P | ;Duration:P | ||
Line 121: | Line 123: | ||
;Source:Data Trails | ;Source:Data Trails | ||
− | ==Host Emulator== | + | ===Host Emulator=== |
;Target:Self | ;Target:Self | ||
;Duration:P | ;Duration:P | ||
Line 154: | Line 156: | ||
;Source:Kill Code | ;Source:Kill Code | ||
− | ==IC Tray== | + | ===IC Tray=== |
;Target:Host | ;Target:Host | ||
;Duration:I | ;Duration:I | ||
Line 166: | Line 168: | ||
;Source:Data Trails | ;Source:Data Trails | ||
− | ==Infusion of [Matrix Attribute]== | + | ===Infusion of [Matrix Attribute]=== |
;Target:Device | ;Target:Device | ||
;Duration:S | ;Duration:S | ||
Line 185: | Line 187: | ||
;Source:Core | ;Source:Core | ||
− | ==Mirrored Persona== | + | ===Mirrored Persona=== |
;Target:Self | ;Target:Self | ||
;Duration:I | ;Duration:I | ||
Line 202: | Line 204: | ||
;Source:Kill Code | ;Source:Kill Code | ||
− | ==Misread Marks== | + | ===Misread Marks=== |
;Target:IC | ;Target:IC | ||
;Duration:P | ;Duration:P | ||
Line 220: | Line 222: | ||
;Source:Data Trails | ;Source:Data Trails | ||
− | ==Pinch== | + | ===Pinch=== |
;Target:Self | ;Target:Self | ||
;Duration:S | ;Duration:S | ||
Line 239: | Line 241: | ||
;Source:Kill Code | ;Source:Kill Code | ||
− | ==Primed Charge== | + | ===Primed Charge=== |
;Target:Self | ;Target:Self | ||
;Duration:I | ;Duration:I | ||
Line 252: | Line 254: | ||
;Source:Kill Code | ;Source:Kill Code | ||
− | ==Pulse Storm== | + | ===Pulse Storm=== |
;Target:Persona | ;Target:Persona | ||
;Duration:I | ;Duration:I | ||
Line 264: | Line 266: | ||
;Source:Core | ;Source:Core | ||
− | ==Puppeteer== | + | ===Puppeteer=== |
;Target:Device | ;Target:Device | ||
;Duration:I | ;Duration:I | ||
Line 281: | Line 283: | ||
;Source:Core | ;Source:Core | ||
− | ==Redundancy== | + | ===Redundancy=== |
;Target:Device | ;Target:Device | ||
;Duration:S | ;Duration:S | ||
Line 296: | Line 298: | ||
;Source:Data Trails | ;Source:Data Trails | ||
− | ==Resonance Bind== | + | ===Resonance Bind=== |
;Target:Persona | ;Target:Persona | ||
;Duration:S | ;Duration:S | ||
Line 316: | Line 318: | ||
;Source:Kill Code | ;Source:Kill Code | ||
− | ==Resonance Cache== | + | ===Resonance Cache=== |
;Target:IC | ;Target:IC | ||
;Duration:I | ;Duration:I | ||
Line 330: | Line 332: | ||
;Source:Kill Code | ;Source:Kill Code | ||
− | ==Resonance Channel== | + | ===Resonance Channel=== |
;Target:Device | ;Target:Device | ||
;Duration:S | ;Duration:S | ||
Line 342: | Line 344: | ||
;Source:Core | ;Source:Core | ||
− | ==Resonance Spike== | + | ===Resonance Spike=== |
;Target:Device | ;Target:Device | ||
;Duration:I | ;Duration:I | ||
Line 355: | Line 357: | ||
;Source:Core | ;Source:Core | ||
− | ==Resonance Veil== | + | ===Resonance Veil=== |
;Target:Device | ;Target:Device | ||
;Duration:S | ;Duration:S | ||
Line 370: | Line 372: | ||
;Source:Core | ;Source:Core | ||
− | ==Search History== | + | ===Search History=== |
;Target:Device | ;Target:Device | ||
;Duration:I | ;Duration:I | ||
Line 383: | Line 385: | ||
;Source:Kill Code | ;Source:Kill Code | ||
− | ==Static Bomb== | + | ===Static Bomb=== |
;Target:Self | ;Target:Self | ||
;Duration:I | ;Duration:I | ||
Line 398: | Line 400: | ||
;Source:Core | ;Source:Core | ||
− | ==Static Veil== | + | ===Static Veil=== |
;Target:Persona | ;Target:Persona | ||
;Duration:S | ;Duration:S | ||
Line 413: | Line 415: | ||
;Source:Core | ;Source:Core | ||
− | ==Stitches== | + | ===Stitches=== |
;Target:Sprite | ;Target:Sprite | ||
;Duration:P | ;Duration:P | ||
Line 424: | Line 426: | ||
;Source:Core | ;Source:Core | ||
− | ==Weaken Data Bomb== | + | ===Weaken Data Bomb=== |
;Target:File | ;Target:File | ||
;Duration:I | ;Duration:I | ||
Line 437: | Line 439: | ||
;Source:Kill Code | ;Source:Kill Code | ||
− | ==Weaken Encryption== | + | ===Weaken Encryption=== |
;Target:File | ;Target:File | ||
;Duration:I | ;Duration:I | ||
Line 450: | Line 452: | ||
;Source:Kill Code | ;Source:Kill Code | ||
− | ==Tattletale== | + | ===Tattletale=== |
;Target:Persona | ;Target:Persona | ||
;Duration:P | ;Duration:P | ||
Line 463: | Line 465: | ||
;Source:Core | ;Source:Core | ||
− | ==Transcendent Grid== | + | ===Transcendent Grid=== |
;Target:Self | ;Target:Self | ||
;Duration:I | ;Duration:I |
Revision as of 13:36, 21 July 2020
5th Edition Rules |
---|
Basics // Combat // Magic // Matrix // Driving // Character Creation |
Basics | Skills/Attributes | Actions | Jargon | Cyberdecks | Programs | How To | Complex Forms | Echoes | Sprites | Sprite Powers | IC |
---|
All Streams
Arc Feedback
- Target
- Icon
- Duration
- S
- Fading
- L-2
Arc Feedback grants the technomancer the ability to catch some of the energy of a successful attack against them and send it back toward the attacker. While a technomancer is sustaining this form, every time they receive Matrix damage — that is to say, damage remaining after any and all resistance rolls — they roll Software + Resonance [Level] v. Willpower + Firewall of the attacker. If the test succeeds, the damage the technomancer was not able to resist is reflected back to the attacker at a ratio of 1 point of damage for every 2 inflicted on the technomancer. Net hits on the test increase the damage, and the total damage must be resisted by the original attacker. Damage reflected back on the attacker does not reduce the damage taken by the technomancer.
- Source
- Kill Code
Bootleg Program
- Target
- Device
- Duration
- I
- Fading
- L-2
Target a device and make an opposed Software + Resonance [Level] vs. Willpower + Firewall test. On a successful test, the technomancer may copy the effects of one program currently running on the device for a number of combat turns equal to the number of net hits. This complex form may not copy an agent or a program the technomancer already knows as a Resonance [program] echo (p. 258, SR5). A technomancer may only benefir from one Bootleg Program at a time; threading a new Bootleg Program complex form cancels any remaing effects of the previous one.
- Source
- Kill Code
Cleaner
- Target
- Persona
- Duration
- S
- Fading
- L-2
Illegal actions leave traces in the Matrix, but the Resonance can erase a few of them. Make a Simple Software + Resonance [Level] test. For each hit, reduce the target’s Overwatch Score by 1.
- Source
- Core
Coriolis
- Target
- Persona
- Duration
- E (5, 24 hours)
- Source
- Chrome Flesh
Derezz
- Target
- Persona
- Duration
- I
- Fading
- L-1
A stiletto or ice pick as opposed to the typical superheated sledgehammers, the Resonance energy from this form slides into the cracks and holes in the target’s armor and strips it away slightly. Make a Software + Resonance [Level] v. Willpower + Firewall test, doing 1 box of Matrix damage per net hit, and dropping the target’s Firewall attribute by 1 until the device has rebooted. Additional successful Derezz attacks do not stack the Firewall adjustment, even if they are from two separate technomancers.
- Source
- Data Trails
Diffusion of [Matrix Attribute]
- Target
- Device
- Duration
- S
- Fading
- L-2
This complex form entry is shorthand for four different complex forms, one for each Matrix attribute. Make an Opposed Software + Resonance [Level] v. Willpower + Firewall test. If you win, the target’s attribute is reduced by your net hits. You can’t reduce an attribute to less than 1.
- Source
- Core
Editor
- Target
- File
- Duration
- P
- Fading
- L-1
You infuse a file with Resonance long enough to manipulate its contents. Make a Software + Resonance [Level] test against the Intuition + Data Processing of the file’s owner. You can make the same amount of changes to the file that you would be able to make with your net hits in Edit File actions.
- Source
- Core
FAQ
- Target
- Device
- Duration
- P
- Fading
- L-3
Scanning the very darkest depths of the Matrix to find out exactly what has been going on with the device they physically have or the host they are current inside of, the technomancer is able to delve into the very deepest questions to find out the true purpose of it. Make an immediate Computer + Intuition [Level] Test with Level / 2 (rounded up) dice added to the pool from the complex form. Gamemasters should provide information to the player based on the number of hits this test generates, with truly obscure or long-forgotten bytes of information requiring 6 hits.
- Source
- Data Trails
Host Emulator
- Target
- Self
- Duration
- P
- Fading
- L
Sometimes the target needs to believe that they’re in a regular host doing typical things when a runner needs that target to be doing anything but that. And sometimes a little illusion is all you need to log a target’s keystrokes or get their banking PINs. Whatever it is, it’s always better to have a host emulator in your back pocket, just in case. When threading the Host Emulator complex form, a technomancer makes a Software + Resonance [Level] simple test. They create a host that looks legitimate, but is not, though the pseudo-host does appear to have been created through official channels. This pseudo-host seems functional but does not store any data and cannot make or run IC. The technomancer may attempt to make the pseudo-host appear to be a host that already exists, if they have at least one mark on that host when this complex form is threaded. Anyone entering it may realize it’s not a real host by performing a Matrix Perception test, with a threshold equal to the number of hits rolled when threading this complex form. In the event that someone attempts to hack the host, treat the pseudo-host’s rating as (2 x number of hits on the threading test). If the hack is successful, the hacker gets marks on the technomancer and sees through the illusion.This complex form may be dismissed by the technomancer as a Simple Action.
- Source
- Kill Code
IC Tray
- Target
- Host
- Duration
- I
- Fading
- L-5
This form scans the host the technomancer is currently residing in and displays a list of the IC it is currently equipped to deploy, up to the number of hits scored on an Opposed Software + Resonance [Level] vs. Host Rating + Sleaze Test.
- Source
- Data Trails
Infusion of [Matrix Attribute]
- Target
- Device
- Duration
- S
- Fading
- L-2
This complex form entry is shorthand for four different complex forms, one for each Matrix attribute. Resonance floods the target device, boosting the specified attribute. The Level of the complex form must equal or exceed the value of the attribute being affected. The attribute is increased by the number of hits scored, up to twice the target’s normal rating (any hits that would increase the at- tribute beyond this maximum are ignored). Each attribute can only be affected by a single Infusion at a time. If an attribute boosted by this complex form is swapped in a Reconfigure action, this complex form ends.
- Source
- Core
Mirrored Persona
- Target
- Self
- Duration
- I
- Fading
- L-2
You can create a proxy persona that looks and acts identical to you in the Matrix. To differentiate between the technomancer and the proxy, opponents must succeed on a Matrix Perception test with a threshold of the number of hits rolled when threading this form. If they fail to notice, opponents target the proxy with a Matrix Action. The player rolls a defense test as normal. If they succeed, the proxy disappears, and technomancer character takes no negative effect.
- Source
- Kill Code
Misread Marks
- Target
- IC
- Duration
- P
- Fading
- L-1
A nasty little thing that will manipulate how IC perceives the Matrix, and who exactly is friend or foe. Temporarily tricks a targeted IC into thinking your marks are its intended targets, similar to the way someone might mistakenly attack a magic-user’s illusion. This lasts for for a number of actions (including Simple or Complex, but not Free) equal to the hits scored on a Simple Software + Resonance [Level] Test. If you have multiple marks in the same host, the mark that is attacked is selected randomly.
- Source
- Data Trails
Pinch
- Target
- Self
- Duration
- S
- Fading
- L + 2
When you’re caught in the crossfire, sometimes the only thing to do is burn down everything around you. If a technomancer is sustaining this form when their Matrix condition monitor becomes full or when they are otherwise forcibly removed from the Matrix, all icons the technomancer has marks on and all icons that have marks on the technomancer take Matrix damage equal to the level of the complex form. This damage may be resisted. If a technomancer is removed by the fade damage from threading this form, the form fizzles and returns to the fabric of the Resonance before it can take effect.
- Source
- Kill Code
Primed Charge
- Target
- Self
- Duration
- I
- Fading
- L
When a technomancer harnesses the raw power of the Resonance, it can make any obstacle that gets in their way regret its choices. Make a Software + Resonance [Level] test. The next Matrix action you perform gains a dice pool bonus equal to the number of hits on this test.
- Source
- Kill Code
Pulse Storm
- Target
- Persona
- Duration
- I
- Fading
- L-3
You pull signals out of the Resonance and surround the target with them. Make a Software + Resonance [Level] v. Logic + Data Processing test. For each net hit you get, the target’s noise is increased by 1.
- Source
- Core
Puppeteer
- Target
- Device
- Duration
- I
- Fading
- L+1
You push Resonance commands into a target, forcing it to perform a Matrix action. Pick a target and a Matrix action for it to perform. Make a Software + Resonance [Level] v. Willpower + Firewall test with a threshold based on the type of action: 1 for a Free Action, 2 for Simple, and 3 for Complex. If you succeed, the target performs that Matrix action as its next available action.
- Source
- Core
Redundancy
- Target
- Device
- Duration
- S
- Fading
- L-3
This form works with Resonance threads to better allow for secondary and tertiary connections, making the device slightly tougher for a limited amount of time. Redundancy grants additional, temporary boxes to the Matrix Damage Track to one device, giving a number of boxes equal to the hits acquired on a Simple Software + Resonance [Level] Test.
- Source
- Data Trails
Resonance Bind
- Target
- Persona
- Duration
- S
- Fading
- L-2
Need to slow the opposition down? Snag them in a Resonance Bind that hinders all actions in the Matrix. Make a Software + Resonance [Level] v. Intuition + Data Processing opposed test. On a successful attack, each net hit reduces the target’s Initiative Score by 2. If you sustain the complex form, the target loses the same amount from their Initiative Score at the beginning of each combat turn. A target caught in Resonance Bind may attempt to break free of the binding by making a Cybercombat + Logic [Attack/Sleaze] v. the complex form’s Level x 2 opposed test. Success only means that they stop future Initiative Score loss; they do not regain any points of Initiative Score in the present Combat Turn.
- Source
- Kill Code
Resonance Cache
- Target
- IC
- Duration
- I
- Fading
- L-2
The technomancer pushes a single IC into a stream of Resonance that isolates it, effectively locking it away. Make a Software + Resonance [Level] v. Host Rating x 2 opposed test. On a successful test, the IC is locked in a Resonance fold for a number of combat turns equal to the complex form’s level.
- Source
- Kill Code
Resonance Channel
- Target
- Device
- Duration
- S
- Fading
- L-4
Instead of using Matrix channels, you communicate through a Resonance channel. Make a Simple Software + Resonance [Level] test. For each net hit, reduce the noise due to distance from the target device by 1.
- Source
- Core
Resonance Spike
- Target
- Device
- Duration
- I
- Fading
- L-3
You send a spike of raw destructive Resonance into the target, causing errors and mayhem. Make a Software + Resonance [Level] v. Willpower + Firewall test. Your target takes 1 box of Matrix damage per net hit, with no chance to resist.
- Source
- Core
Resonance Veil
- Target
- Device
- Duration
- S
- Fading
- L-4
This complex form lets you make the target believe something has happened in the Matrix. It’s a convincing illusion if you can succeed in a Software + Resonance [Level] v. Intuition + Data Processing test. Even if the target has reason to believe what it’s seeing is fake, it needs to make a Matrix Perception Test with a threshold equal to your net hits to see through the illusion.
- Source
- Core
Search History
- Target
- Device
- Duration
- I
- Fading
- L-2
Target a device and make a Software + Resonance [Level] v. Device Rating x 2 opposed test. On a successful test, the technomancer has a full record of the device’s Matrix history over a number of days past equal to the number of net hits.
- Source
- Kill Code
Static Bomb
- Target
- Self
- Duration
- I
- Fading
- L-1
Make a Software + Resonance [Level] v. Intuition + Data Processing test against all icons that have spotted you. If there’s more than one, compare your hits to each of theirs separately. Each icon you beat loses you, and you’re no longer spotted by those icons. Any icon that has a mark on you doesn’t lose you, of course.
- Source
- Core
Static Veil
- Target
- Persona
- Duration
- S
- Fading
- L-4
Resonance energy coils around you, hiding you from GOD. Make a Simple Software + Resonance [Level] test with a threshold of 1 if the target is on the public grid and 2 on any other grid. As long as you sustain this complex form and the target doesn’t hop to another grid, the veiled persona’s Overwatch Score doesn’t increase due to time (p. 231). It still increases as a result of the target’s illegal actions, though.
- Source
- Core
Stitches
- Target
- Sprite
- Duration
- P
- Fading
- L-5
You knit the Resonance patterns in a sprite back together. Make a Simple Software + Resonance [Level] test. For each hit, remove 1 box of Matrix damage from the target sprite.
- Source
- Core
Weaken Data Bomb
- Target
- File
- Duration
- I
- Fading
- L-2
Make a Software + Resonance [Level] v. Data Bomb Rating x 2 opposed test. On a successful test, the form lowers the rating of a data bomb by the number of net hits (to a minimum of 1).
- Source
- Kill Code
Weaken Encryption
- Target
- File
- Duration
- I
- Fading
- L-3
Make a Software v. Resonance [Level] v. Protection Rating x 2 opposed test. On a successful test, the form lowers the rating of the file’s protection (see Edit File, p. 249, SR5) by the number of net hits (to a minimum of 1).
- Source
- Kill Code
Tattletale
- Target
- Persona
- Duration
- P
- Fading
- L-5
The Resonance can be used to mimic the telltale signs of illegal activity in the Matrix — to your target’s sorrow. Make a Simple Software + Resonance [Level] test. For each hit, increase the target’s Overwatch Score by 1. This only works if your target has an Overwatch Score.
- Source
- Core
Transcendent Grid
- Target
- Self
- Duration
- I
- Fading
- L-6
You broaden your connection to the Matrix and connect to all grids at once. You take no penalty for acting across grids (because you’re on all of them), but neither do others targeting you. You also don’t take a penalty from the public grid. Make a Simple Software + Resonance [Level] Test. The effect persists for one minute for every hit you get. When you run out of hits, the complex form ends.
- Source
- Core