Skip to content

Exploit Database

Dragynrain edited this page Nov 13, 2025 · 1 revision

Exploit Database

Complete reference for all exploits (abilities) in Rogue Signal Protocol.

There are 13 exploits organized into 4 categories.

Stealth Exploits

Abilities focused on avoiding detection, repositioning, and manipulating enemy awareness.

System Hop

Cost: 3 RAM | Heat: 30° | Range: 6 tiles

Rapidly pivot to any monitoring blind spot within 6 tiles. Instant relocation through pre-established network connections - perfect for repositioning.

Technical Details:

  • Targeting: SINGLE

Tactical Notes:

  • Instant repositioning for escapes or flanking
  • No line of sight required
  • Low heat cost for frequent use

Traffic Masquerade

Cost: 2 RAM | Heat: 25° | Range: 0 tiles

Masquerade as legitimate traffic patterns. Become completely invisible to security protocols for 5 turns - walk past enemies undetected.

Technical Details:

  • Targeting: NONE
  • Duration: 5 turns

Tactical Notes:

  • Complete invisibility for 5 turns
  • Walk past enemies freely
  • Attacking breaks invisibility

Decoy Swarm

Cost: 1 RAM | Heat: 15° | Range: 8 tiles

Spawn false alerts and decoy processes. Creates a convincing distraction lasting 8 turns - lure enemies away from your path.

Technical Details:

  • Targeting: SINGLE
  • Effect Radius: 10 tiles
  • Duration: 8 turns
  • Alert Duration (Patrol): 3 turns
  • Alert Duration (Normal): 2 turns

Tactical Notes:

  • Lures enemies away from your position
  • Long duration (8 turns) for extended distraction
  • Patrol enemies stay distracted longer

Memory Leak

Cost: 2 RAM | Heat: 30° | Range: 1 tiles

Corrupt enemy vision systems in a 3x3 area. Blinded enemies can't see you for 3 turns while they reboot - but they keep moving. Use it to dodge into blind spots!

Technical Details:

  • Targeting: AREA
  • Effect Radius: 1 tiles
  • Duration: 3 turns

Tactical Notes:

  • Blinds enemies in 3x3 area
  • Enemies keep moving while blind
  • Use to slip past patrols

Combat Exploits

Offensive abilities for damaging or disabling enemies.

Buffer Overflow

Cost: 2 RAM | Heat: 30° | Range: 1 tiles

Overload a target's memory buffer with malicious data. Devastating close-range exploit dealing 40 damage - high risk, high reward.

Technical Details:

  • Targeting: SINGLE
  • Damage: 40

Tactical Notes:

  • Highest damage single-target exploit
  • Melee range only (1 tile)
  • Combine with blind spot ambush for 50 total damage

Code Injection

Cost: 2 RAM | Heat: 20° | Range: 5 tiles

Execute hostile code remotely in a target's process space. Reliable ranged attack dealing 25 damage from up to 5 tiles away.

Technical Details:

  • Targeting: SINGLE
  • Damage: 25

Tactical Notes:

  • Reliable ranged damage
  • 5 tile range for safe attacks
  • Moderate heat cost for repeated use

Logic Bomb

Cost: 2 RAM | Heat: 35° | Range: 4 tiles

Deploy a delayed-trigger exploit that detonates in a large radius. Deals 15 damage to all targets within 2 tiles of impact point. WARNING: Can damage you if detonated too close!

Technical Details:

  • Targeting: AREA
  • Damage: 15
  • Effect Radius: 2 tiles

Tactical Notes:

  • Area damage centered on target location
  • Can damage you if too close!
  • Good for grouped enemies

Denial of Service

Cost: 3 RAM | Heat: 35° | Range: 4 tiles

Flood a network segment with overwhelming traffic. Area attack disabling all affected enemies for 5 turns in radius 1.

Technical Details:

  • Targeting: AREA
  • Effect Radius: 1 tiles
  • Duration: 5 turns

Tactical Notes:

  • Disables enemies without killing
  • 5 turn duration for repositioning
  • Area effect (radius 1)

Utility Exploits

Support abilities for information gathering, resource management, and status effects.

Threat Scan

Cost: 1 RAM | Heat: 25° | Range: 0 tiles

Tap into security monitoring feeds. Reveals all hostile programs, their detection ranges, and predicted movement paths for 5 turns.

Technical Details:

  • Targeting: NONE
  • Duration: 5 turns

Tactical Notes:

  • Reveals enemy vision cones
  • Shows predicted movement paths
  • Essential for stealth planning

Network Scan

Cost: 1 RAM | Heat: 20° | Range: 0 tiles

Query the network topology for maintenance systems. Instantly reveals locations of all cooling nodes, CPU recovery nodes, and ghost nodes.

Technical Details:

  • Targeting: NONE

Tactical Notes:

  • Reveals all special nodes instantly
  • Find cooling/CPU/ghost nodes
  • One-time use per level recommended

Log Wiper

Cost: 2 RAM | Heat: 20° | Range: 0 tiles

Scrub your activity from system logs and audit trails. Significantly reduces your detection level by 30% - cover your tracks.

Technical Details:

  • Targeting: NONE
  • Trace Reduction: 30%

Tactical Notes:

  • Reduces trace by 30%
  • Prevents Admin Avatar spawn
  • Use when trace exceeds 70%

Antivirus

Cost: 2 RAM | Heat: 25° | Range: 0 tiles

Run a quarantine protocol on your own systems. Instantly purges all hostile effects like viruses and movement inhibitors.

Technical Details:

  • Targeting: NONE

Tactical Notes:

  • Cures virus and slow effects
  • Instant cleanse, no duration
  • Keep equipped when Viruses present

Emergency Exploits

High-risk, high-reward last resort abilities.

System Crash

Cost: 3 RAM | Heat: 35° | Range: 0 tiles

Force a critical system error - CRASHES THE SYSTEM YOU'RE ON! Deals 30 damage to YOU and all nearby enemies, stunning them for 3 turns. Last resort when surrounded.

Technical Details:

  • Targeting: NONE
  • Damage: 30
  • Self Damage: 30 ⚠️
  • Effect Radius: 3 tiles
  • Duration: 3 turns

Tactical Notes:

  • DEALS SELF-DAMAGE! Use as last resort
  • Stuns all enemies in radius for 3 turns
  • Effective when surrounded

Quick Reference Table

Exploit Category RAM Heat Range Damage Duration
System Hop Stealth 3 30 6 - -
Traffic Masquerade Stealth 2 25 0 - 5
Decoy Swarm Stealth 1 15 8 - 8
Buffer Overflow Combat 2 30 1 40 -
Code Injection Combat 2 20 5 25 -
System Crash Emergency 3 35 0 30 3
Logic Bomb Combat 2 35 4 15 -
Threat Scan Utility 1 25 0 - 5
Network Scan Utility 1 20 0 - -
Log Wiper Utility 2 20 0 - -
Antivirus Utility 2 25 0 - -
Denial of Service Combat 3 35 4 - 5
Memory Leak Stealth 2 30 1 - 3

Loadout Strategies

Stealth Build

  • System Hop (3 RAM)
  • Traffic Masquerade (2 RAM)
  • Threat Scan (1 RAM)
  • Log Wiper (2 RAM)

Total: 8 RAM | Focus: Avoiding all combat

Balanced Build

  • Code Injection (2 RAM)
  • System Hop (3 RAM)
  • Threat Scan (1 RAM)
  • Antivirus (2 RAM)

Total: 8 RAM | Focus: Versatility

Combat Build

  • Buffer Overflow (2 RAM)
  • Code Injection (2 RAM)
  • Logic Bomb (2 RAM)
  • System Crash (3 RAM)

Total: 9 RAM | Focus: Elimination

Boss Hunter Build

  • Buffer Overflow (2 RAM)
  • Code Injection (2 RAM)
  • System Hop (3 RAM)
  • Network Scan (1 RAM)

Total: 8 RAM | Focus: Admin Avatar combat

Tips & Strategies

  1. Balance your loadout: Mix stealth, combat, and utility
  2. RAM management: Prioritize low-cost exploits early game
  3. Heat awareness: Don't overheat - 2-3 exploits per combat
  4. Synergies: Threat Scan + System Hop = perfect positioning
  5. Emergency options: Always have an escape (System Hop or Traffic Masquerade)
  6. Adapt per level: Corporate needs stealth, Military needs combat
  7. Upgrade wisely: RAM upgrades unlock better loadouts

Clone this wiki locally