Viral Injector


Image Virus25.jpg
Description It's been known for a while now that corporations have been using viruses for espionage, intercorporate warfare, and even advertising. This takes those technological advances and turns them back into a controlled weapon in the hands of an individual.

It's sort of like taking OmniTech's newest material designs and making sweet knives out of them: regardless of how justified you may feel, they'll always be angry. Admittedly, most of that is probably just because you're not paying their absurd licensing rate.
Type Program
Requires 1 Processor
Tools Corrupt Datastream, Junk Data, False Intrusions, Viral Reformatting


Note: The following recipe still exists but one or more ingredients are no longer available.

Add a Viral Code payload to a Code Injector
Viral Code Code Injector
= Viral Injector


Expand your Viral Injector with a Viral Mass
Requires Advanced Interpreter
Viral Injector Viral Mass
= Viral Formatter
Load an Unstable Integrator into a Viral Injector
Unstable Integrator Viral Injector
= Integrated Injector
computerchip.jpg file interface, viral code
GoldCoins.jpg This item can be discarded via the gang stash.

Tool Summary

Tool Memory Size Target Intensity Notes
Corrupt Datastream 2 Processor 1
False Intrusions 2 Hardening 4 Deals 1 damage to memory instead if the target has no hardening
Junk Data 2 Memory 1 Disrupts normal defenses the target uses during their next pass.
Viral Reformatting 5 Hardening 5 Changes the target into The Virus if it has no hardening
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License