Integrated Injector


Image Syringe25B.jpg
Description There hasn't traditionally been much call for tools that leverage a large network of sites, at least in the hacking community. In the last few decades, at least, large networks like that have been the exclusive perview of the corporations.

You've heard Zaibatsu uses tools like this to great effect, though, borrowing a little from each site that runs their software. Even if that's an urban legend, the theory is sound and this should be pretty handy if you ever find yourself controlling a large network.
Type Program
Requires 2 Processor
Tools Corrupt Datastream, Inject Code, Junk Data, False Intrusions, Inject Relay, Focus Signal


Note: The following recipe still exists but one or more ingredients are no longer available.

Load an Unstable Integrator into a Viral Injector
Unstable Integrator Viral Injector
= Integrated Injector


Hammer25.jpg This item is not a component for any sort of experimental crafting.
GoldCoins.jpg This item cannot be added to a gang stash.

Tool Summary

Tool Memory Size Target Intensity Notes
Corrupt Datastream 2 Processor 1
Inject Code 1 Memory 1 +2 damage if the Defender has no Hardening
Junk Data 2 Memory 1 Disrupts normal defenses the target uses during their next pass.
False Intrusions 2 Hardening 4 Deals 1 damage to memory instead if it the target has no hardening
Inject Relay 5 Memory * Power based on your Personal Signal
Focus Signal 3 Hardening 1* Power based on your Personal Signal
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License