Crystal Tester


Image gemd.jpg
Description On the surface, this software could easily be mistaken for a defensive suite. It has a lot of careful error checking and data manipulation, but twists most of it into attacking other systems.
Type Program
Requires 1 Processor
Tools Junk Data, False Intrusions, Prism Spike
Effects +1 Hardening


Note: The following recipe still exists but one or more ingredients are no longer available.

Feed a Vulnerability Tester through some Orderly Code
Vulnerability Tester Orderly Code
= crystal tester


Weave Crystal Tester software into Blackthorn v6
Requires Advanced Interpreter
crystal tester Blackthorn v6
= crystal Blackthorn
GoldCoins.jpg This item can be discarded via the gang stash.

Tool Summary

Tool Memory Size Target Intensity Notes
False Intrusions 2 Hardening 4 Deals 1 damage to memory instead if it the target has no hardening
Junk Data 2 Memory 1 Disrupts normal defenses the target uses during their next pass.
Prism Spike 2 Processor 1 better after Barrier
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License