Code Injector


Image Syringe25B.jpg
Description This small package of tools focuses on sabotaging systems with malicious code. It's terribly illegal, which probably means it's handy.
Type Program
Requires 1 Processor
Tools Corrupt Datastream, Inject Code, Junk Data, False Intrusions


Note: The following recipe still exists but one or more ingredients are no longer available.

Implement your Vulnerability Database with a File Interface
Vulnerability Database File Interface
= Code Injector


Widen the scope of a Code Injector with a Quick Scan and a Deep File Scan
Quest Recipe: Learn recipe from browsing hidden files in a software company
Code Injector Quick Scan Deep File Scan
= Data Scrubber
Grant your Code Injector further access with a Deep File Scan
Requires Advanced Interpreter
Code Injector Deep File Scan
= Depth Charge
Extend the reach of your Network Jammer within systems with a Code Injector
Requires Advanced Interpreter
Network Jammer Code Injector
= Intrusive Jammer
Feed a Protein Reader through a Code Injector
Requires Advanced Interpreter
protein reader code injector
= protein hijacker
Add a Viral Code payload to a Code Injector
Viral Code Code Injector
= Viral Injector
computerchip.jpg Can be decompiled, results unknown.
GoldCoins.jpg This item cannot be added to a gang stash.

Tool Summary

Tool Memory Size Target Intensity Notes
Corrupt Datastream 2 Processor 1
False Intrusions 2 Hardening 4 Deals 1 damage to memory instead if it the target has no hardening
Inject Code 1 Memory 1 +2 damage if the Defender has no Hardening
Junk Data 2 Memory 1 Disrupts normal defenses the target uses during their next pass.
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License