Set 2 is where movement turns into consequence.
Once the target network has been defined, the hacker makes a move.
And the system answers.
This set generates:
Set 2 is not just about breaking in.
It is about consequence.
Every intrusion leaves a trace.
Every trace triggers a response.
Every response reshapes the battlefield.
Brute-force breaches, social engineering vectors, neural ghost-walking, zero-day exploitation, identity spoofing.
Custom cyberdeck modules, black-market intrusion suites, AI-assisted bypass engines, quantum scramblers.
Data-corrupting worms, surveillance backdoors, adaptive logic parasites, memetic payloads.
Adaptive ICE constructs, corporate watchdog AIs, biometric lockdown cascades, predictive counter-hack protocols.
System lockdown, trace initiation, localized blackout, alert escalation, partial data corruption.
Neural feedback trauma, identity bleed, hallucinated system echoes, memory distortion, emotional desynchronization.
Corporate retaliation, market instability, rogue AI mutation, infrastructure shifts, digital ecosystem imbalance.
Use Set 2 to:
This set transforms hacking from action into ripple effect.
Neural Hack Protocol is not a clean cyberpunk fantasy.
Connection has a cost.
The network reacts.
The corporation adapts.
The AI learns.
And sometimes…
The hacker changes more than the system.
License: Roll20 End User License Agreement
(Personal Use Only, Do Not Distribute)