InfiltratorsSource Interstellar Species pg. 168 Infiltrators are skilled at sneaking in and out of restricted places. Although different types of infiltrators may have similar goals, their methods for avoiding or compromising guards and security measures differ greatly: shapeshifters rely on their ability to become someone else, spies are masters of remaining undetected, hackers can easily break into both physical locations and computer systems to steal information, and double agents are trained to maintain a cover and lie about their allegiances. In adventures, infiltrators are most often encountered as antagonists who are planning to break into a secure facility to carry out acts of espionage or sabotage or to exfiltrate prisoners. Depending on the type of gig in question, infiltrators may work with assassins or thievesAliens in the "Infiltrators" FamilySource Interstellar Species pg. 168Hacker CR 5XP 1,600 SRO CN Small construct (technological) Init +3; Senses darkvision 60 ft.; Perception +11
DefenseHP 65 EAC 17; KAC 18 Fort +2; Ref +2; Will +6 Defensive Abilities robotic
OffenseSpeed 30 ft. Ranged swagger handcannon +13 (1d12+5 P; critical knockdown) Offensive Abilities hack equipmentStatisticsSTR +0; DEX +3; CON +0; INT +5; WIS +2; CHA +0 Skills Computers +16, Engineering +16, Physical Science +11, Sleight of Hand +11, Stealth +16 Languages Common Other Abilities healing circuit , integrated equipment , natural- born hacker Gear business stationwear, swagger handcannon with 12 scattergun shells, integrated high-density datajack, integrated personal comm unitSpecial AbilitiesHack Equipment (Ex) As a standard action, a hacker can attempt to temporarily deactivate one weapon, piece of equipment, or armor upgrade within 30 feet, provided it’s a technological or hybrid item. They roll 1d20 + their CR; the DC is equal to 10 + the item level. If they succeed, they deactivate the device until the beginning of their next turn. The device’s owner can take a move action and attempt an Engineering check with a DC equal to 10 + 1-1/2 × the hacker’s CR + their Dexterity modifier (DC 20 for this hacker). If they succeed, they reactivate the device. Natural-Born Hacker (Ex) Equipped with integrated tools, a hacker always counts as having the appropriate tool or basic kit for any Computer or Engineering skill check they attempt. Additionally, they can attempt Computers and Engineering skill checks at a range of 30 feet. When they use this ability to remotely hack a mechanism or computer, a clearly visible holographic keyboard manifests in front of them, making it obvious they’re the origin of the activity. DescriptionHackers are experts at bypassing security measures and getting into computer systems. They usually aim to steal intellectual property or sensitive personal records to blackmail people, or use malware to compromise systems. Hackers take pride in their skills but value their lives even more. Rather than getting directly involved in combat, a hacker prefers to partner with muscle to keep hostiles at bay.
|