Archives of Nethys

Pathfinder RPG (1st Edition) Starfinder RPG Pathfinder RPG (2nd Edition)

All | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | Starship-Scale | T | U | V | W | X | Y | Z

Template Grafts | Universal Monster Rules


Source Interstellar Species pg. 168
Infiltrators are skilled at sneaking in and out of restricted places. Although different types of infiltrators may have similar goals, their methods for avoiding or compromising guards and security measures differ greatly: shapeshifters rely on their ability to become someone else, spies are masters of remaining undetected, hackers can easily break into both physical locations and computer systems to steal information, and double agents are trained to maintain a cover and lie about their allegiances.
In adventures, infiltrators are most often encountered as antagonists who are planning to break into a secure facility to carry out acts of espionage or sabotage or to exfiltrate prisoners. Depending on the type of gig in question, infiltrators may work with assassins or thieves

Aliens in the "Infiltrators" Family

Double Agent8

Infiltrators, Hacker

Source Interstellar Species pg. 168

Hacker CR 5

XP 1,600
CN Small construct (technological)
Init +3; Senses darkvision 60 ft.; Perception +11


HP 65
EAC 17; KAC 18
Fort +2; Ref +2; Will +6
Defensive Abilities robotic


Speed 30 ft.
Ranged swagger handcannon +13 (1d12+5 P; critical knockdown)
Offensive Abilities hack equipment


STR +0; DEX +3; CON +0; INT +5; WIS +2; CHA +0
Skills Computers +16, Engineering +16, Physical Science +11, Sleight of Hand +11, Stealth +16
Languages Common
Other Abilities healing circuit , integrated equipment , natural- born hacker
Gear business stationwear, swagger handcannon with 12 scattergun shells, integrated high-density datajack, integrated personal comm unit

Special Abilities

Hack Equipment (Ex) As a standard action, a hacker can attempt to temporarily deactivate one weapon, piece of equipment, or armor upgrade within 30 feet, provided it’s a technological or hybrid item. They roll 1d20 + their CR; the DC is equal to 10 + the item level. If they succeed, they deactivate the device until the beginning of their next turn.
The device’s owner can take a move action and attempt an Engineering check with a DC equal to 10 + 1-1/2 × the hacker’s CR + their Dexterity modifier (DC 20 for this hacker). If they succeed, they reactivate the device.
Natural-Born Hacker (Ex) Equipped with integrated tools, a hacker always counts as having the appropriate tool or basic kit for any Computer or Engineering skill check they attempt. Additionally, they can attempt Computers and Engineering skill checks at a range of 30 feet. When they use this ability to remotely hack a mechanism or computer, a clearly visible holographic keyboard manifests in front of them, making it obvious they’re the origin of the activity.


Hackers are experts at bypassing security measures and getting into computer systems. They usually aim to steal intellectual property or sensitive personal records to blackmail people, or use malware to compromise systems. Hackers take pride in their skills but value their lives even more. Rather than getting directly involved in combat, a hacker prefers to partner with muscle to keep hostiles at bay.