-
Notifications
You must be signed in to change notification settings - Fork 0
Exploit Database
Complete reference for all exploits (abilities) in Rogue Signal Protocol.
There are 13 exploits organized into 4 categories.
Abilities focused on avoiding detection, repositioning, and manipulating enemy awareness.
Cost: 3 RAM | Heat: 30° | Range: 6 tiles
Rapidly pivot to any monitoring blind spot within 6 tiles. Instant relocation through pre-established network connections - perfect for repositioning.
Technical Details:
- Targeting: SINGLE
Tactical Notes:
- Instant repositioning for escapes or flanking
- No line of sight required
- Low heat cost for frequent use
Cost: 2 RAM | Heat: 25° | Range: 0 tiles
Masquerade as legitimate traffic patterns. Become completely invisible to security protocols for 5 turns - walk past enemies undetected.
Technical Details:
- Targeting: NONE
- Duration: 5 turns
Tactical Notes:
- Complete invisibility for 5 turns
- Walk past enemies freely
- Attacking breaks invisibility
Cost: 1 RAM | Heat: 15° | Range: 8 tiles
Spawn false alerts and decoy processes. Creates a convincing distraction lasting 8 turns - lure enemies away from your path.
Technical Details:
- Targeting: SINGLE
- Effect Radius: 10 tiles
- Duration: 8 turns
- Alert Duration (Patrol): 3 turns
- Alert Duration (Normal): 2 turns
Tactical Notes:
- Lures enemies away from your position
- Long duration (8 turns) for extended distraction
- Patrol enemies stay distracted longer
Cost: 2 RAM | Heat: 30° | Range: 1 tiles
Corrupt enemy vision systems in a 3x3 area. Blinded enemies can't see you for 3 turns while they reboot - but they keep moving. Use it to dodge into blind spots!
Technical Details:
- Targeting: AREA
- Effect Radius: 1 tiles
- Duration: 3 turns
Tactical Notes:
- Blinds enemies in 3x3 area
- Enemies keep moving while blind
- Use to slip past patrols
Offensive abilities for damaging or disabling enemies.
Cost: 2 RAM | Heat: 30° | Range: 1 tiles
Overload a target's memory buffer with malicious data. Devastating close-range exploit dealing 40 damage - high risk, high reward.
Technical Details:
- Targeting: SINGLE
- Damage: 40
Tactical Notes:
- Highest damage single-target exploit
- Melee range only (1 tile)
- Combine with blind spot ambush for 50 total damage
Cost: 2 RAM | Heat: 20° | Range: 5 tiles
Execute hostile code remotely in a target's process space. Reliable ranged attack dealing 25 damage from up to 5 tiles away.
Technical Details:
- Targeting: SINGLE
- Damage: 25
Tactical Notes:
- Reliable ranged damage
- 5 tile range for safe attacks
- Moderate heat cost for repeated use
Cost: 2 RAM | Heat: 35° | Range: 4 tiles
Deploy a delayed-trigger exploit that detonates in a large radius. Deals 15 damage to all targets within 2 tiles of impact point. WARNING: Can damage you if detonated too close!
Technical Details:
- Targeting: AREA
- Damage: 15
- Effect Radius: 2 tiles
Tactical Notes:
- Area damage centered on target location
- Can damage you if too close!
- Good for grouped enemies
Cost: 3 RAM | Heat: 35° | Range: 4 tiles
Flood a network segment with overwhelming traffic. Area attack disabling all affected enemies for 5 turns in radius 1.
Technical Details:
- Targeting: AREA
- Effect Radius: 1 tiles
- Duration: 5 turns
Tactical Notes:
- Disables enemies without killing
- 5 turn duration for repositioning
- Area effect (radius 1)
Support abilities for information gathering, resource management, and status effects.
Cost: 1 RAM | Heat: 25° | Range: 0 tiles
Tap into security monitoring feeds. Reveals all hostile programs, their detection ranges, and predicted movement paths for 5 turns.
Technical Details:
- Targeting: NONE
- Duration: 5 turns
Tactical Notes:
- Reveals enemy vision cones
- Shows predicted movement paths
- Essential for stealth planning
Cost: 1 RAM | Heat: 20° | Range: 0 tiles
Query the network topology for maintenance systems. Instantly reveals locations of all cooling nodes, CPU recovery nodes, and ghost nodes.
Technical Details:
- Targeting: NONE
Tactical Notes:
- Reveals all special nodes instantly
- Find cooling/CPU/ghost nodes
- One-time use per level recommended
Cost: 2 RAM | Heat: 20° | Range: 0 tiles
Scrub your activity from system logs and audit trails. Significantly reduces your detection level by 30% - cover your tracks.
Technical Details:
- Targeting: NONE
- Trace Reduction: 30%
Tactical Notes:
- Reduces trace by 30%
- Prevents Admin Avatar spawn
- Use when trace exceeds 70%
Cost: 2 RAM | Heat: 25° | Range: 0 tiles
Run a quarantine protocol on your own systems. Instantly purges all hostile effects like viruses and movement inhibitors.
Technical Details:
- Targeting: NONE
Tactical Notes:
- Cures virus and slow effects
- Instant cleanse, no duration
- Keep equipped when Viruses present
High-risk, high-reward last resort abilities.
Cost: 3 RAM | Heat: 35° | Range: 0 tiles
Force a critical system error - CRASHES THE SYSTEM YOU'RE ON! Deals 30 damage to YOU and all nearby enemies, stunning them for 3 turns. Last resort when surrounded.
Technical Details:
- Targeting: NONE
- Damage: 30
- Self Damage: 30
⚠️ - Effect Radius: 3 tiles
- Duration: 3 turns
Tactical Notes:
- DEALS SELF-DAMAGE! Use as last resort
- Stuns all enemies in radius for 3 turns
- Effective when surrounded
| Exploit | Category | RAM | Heat | Range | Damage | Duration |
|---|---|---|---|---|---|---|
| System Hop | Stealth | 3 | 30 | 6 | - | - |
| Traffic Masquerade | Stealth | 2 | 25 | 0 | - | 5 |
| Decoy Swarm | Stealth | 1 | 15 | 8 | - | 8 |
| Buffer Overflow | Combat | 2 | 30 | 1 | 40 | - |
| Code Injection | Combat | 2 | 20 | 5 | 25 | - |
| System Crash | Emergency | 3 | 35 | 0 | 30 | 3 |
| Logic Bomb | Combat | 2 | 35 | 4 | 15 | - |
| Threat Scan | Utility | 1 | 25 | 0 | - | 5 |
| Network Scan | Utility | 1 | 20 | 0 | - | - |
| Log Wiper | Utility | 2 | 20 | 0 | - | - |
| Antivirus | Utility | 2 | 25 | 0 | - | - |
| Denial of Service | Combat | 3 | 35 | 4 | - | 5 |
| Memory Leak | Stealth | 2 | 30 | 1 | - | 3 |
- System Hop (3 RAM)
- Traffic Masquerade (2 RAM)
- Threat Scan (1 RAM)
- Log Wiper (2 RAM)
Total: 8 RAM | Focus: Avoiding all combat
- Code Injection (2 RAM)
- System Hop (3 RAM)
- Threat Scan (1 RAM)
- Antivirus (2 RAM)
Total: 8 RAM | Focus: Versatility
- Buffer Overflow (2 RAM)
- Code Injection (2 RAM)
- Logic Bomb (2 RAM)
- System Crash (3 RAM)
Total: 9 RAM | Focus: Elimination
- Buffer Overflow (2 RAM)
- Code Injection (2 RAM)
- System Hop (3 RAM)
- Network Scan (1 RAM)
Total: 8 RAM | Focus: Admin Avatar combat
- Balance your loadout: Mix stealth, combat, and utility
- RAM management: Prioritize low-cost exploits early game
- Heat awareness: Don't overheat - 2-3 exploits per combat
- Synergies: Threat Scan + System Hop = perfect positioning
- Emergency options: Always have an escape (System Hop or Traffic Masquerade)
- Adapt per level: Corporate needs stealth, Military needs combat
- Upgrade wisely: RAM upgrades unlock better loadouts