Comprehensive Matrix Action List
Comprehensive Matrix Action List
Disclaimer
this is my own work and unauthorized by Catalyst Game Labratories
this was made for players to use as a companion to Shadowrun 4th ed Rules presented in
the Shadowrun 4th ed Core Rule Book and Unwired
Not as a replacment to those books
any Mistakes are mine and mine alone and not the mistakes of CCG or its affiliates
While some of the powers, Matrix actions, and tables have been Printed here in Great Detail, or
even word for word from the source material this document is designed for use with Shadowrun 4th ED
not as a replacement to the source books The intent of this Document is to simplify one of the
complex Aspects of the game of Shadowrun 4th Ed by compiling everything a person need
know in order to work within the Wireless world of the matrix without wasting time
flipping through books looking for particular matrix actions Located in some obscure
location and holding the game up with the spirit of previous editions
This Document is Made with the utmost respect for CGL's Product and is in no way
Designed to Undermine their work
Page 1
Sheet1
Active Subscriptions <= System * 2 Programs Cannot Exceed System which cannot Exceed Response
-1 Response for every (Response) programs running Matrix Condition Modifier = 8 + System / 2
Actions By Programs
Common Use Programs
System
Alter/Swap Icon Free Action
You change a detail of an icon representing your persona or one of the programs, fles, or nodes
own, or switch the icon to a pre-rendered icon you have stored
Page 2
Sheet1
Page 3
Sheet1
Computer + Analyze
in order to notice a hacker running a VPN make an opposed test vs the opponents Firewall + Stealth
Browse
Find information Extended Test
Data Search + Browse
**Find information on a Certain topic with a variable interval and variable threshold
**Used to find Pirate Networks (8,1day)
**Used to Find Pirated Programs (Availability+ Desired Rating, 1 combat turn
**Spot Hidden accounts and Access points Data Search + Browse (Lowest stealth of of hacker
Using the account or Access point x2,1 day)
**Locate Hacked accounts or Reusable exploit (lowest Stealth rating of hacker using exploit
or account, 1 day) ,may be fixed immediately with a Software+ Edit (firewall 1 minuite)
Command
Control Device Complex Action
Command + (Skill)
**Conbtrol a Device through the matrix. Note actions are Complex even if they were simple
Remote Control a Drone Complex Action
Command + Skill
all actions while controlling drones Except for Perception Tests while not jumped in
Issue Command Simple Action
You give a short list of commands to an Agent, Drone, or device that accepts your accesss ID as
authorized to do so, you may send the same commands to multiple recipients
Command Cyberware Simple Action
Command + Hacking
Vs. System + Firewall once hacked into the master node
Command Smartlink Simple Action or Free action
Computer + Command(1) OR Opposed Computr + Command
Free Action if commanding from the smartlink, Simple if command from commlink
Threshold (1) if un controlled Opposed if 2 people are controlling it
Edit
Create your Own Icon
Software + Edit (10, 1 day)
Edit File Complex Action
Computer + Edit
Variable Threshold Determined by the GM
Continuous edit of a device each IP for the duration Simple Action
Edit Trafic after a successful Sniffer Test
Certified Data Complex Action
Hacking + Edit(4) Wipe log on a certified datachip with out corrupting the data
Forgery Extended Test
Forgery + Edit Choose Rating of the forgery (1-6) then apply DP penalties
The Forgery Table is on pg. 95 and 205 in unwired
PFF Files Complex Action
Logic + Software if the character has a valid Corprate SIN that matches the OS
Hacking + Edit(3) if the Character does not have a valid corp SIN to Mach his OS
Page 4
Sheet1
the GM May play these intrusions out or Sumerize them quickly with a
Hacking + Edit ( Rating of Fake SIN x System), 1 hour Extended Test
Legitimate Account Complex Action
If you have Security privileges
Software + Edit
If you do not have security privileges
Hacking + Edit(2) User
Hacking + Edit(3) Security
Hacking+ Edit(4) Admin
DOS Attack Complex Action
Instructig a node to Block future connection requests From a particular node or
or Access ID (or a Range of Nodes/Access ID's)
With Security or Admin privileges
Computer + Edit
Without Security or admin privileges
Hacking + Edit(2)
Deleting Accounts
Software+Edit (1) with Security or admin privileges Hacking + Edit(2) if you dont
If Active the Users Connection must be Terminated first
Hacked Cyberware Complex Action
Computer + Edit
Insert Pre Recorded or Self Created Sensory Input to the appropriate Sensory Receptors
Hacking + Edit
Shut Character out of controling his own implants by deactivating DNI or alter account privileges
Cyberware information Complex Action
Software + Edit Various Thresholds
Change Personal data on cyberware (Owner, License number)
Hacking + Edit
Changing any other information on cybernetics
Proxy Server Extended Test
Computer + Edit With admin Edit + Hacking without
Change Node into a Proxy Node
Track Thresholds +4 and Response -1 per Proxy Used
Trojans Extended Test
Hacking + Edit (10, 1 initiative Pass)
Manually Load a Trojan on a Compromised System
Encrypt
Encrypt Simple Action
you encrypt a file,set of files,nodem or Communications link, Choose passcode
that you or another user can use to decrypt it, you may encrypt multiple files
together into a single Archive file, you may also attach a Data Bomb, or Corrupt
Threshold Sets Threshold of Ratingx2 against decryption
Strong Encryption 1-24 hours
interval for Decryption is equal to the time spent to perform the Stong encryption
May not be used to encrypt Signals encryption
Page 5
Sheet1
Hacking Programs
Armor
Resist System Damage
System + Armor
Armor Programs Add their Rating in Dice to defend the User from any attact that causes Matrix Damage
Attack
Matrix Attack Action Complex Action
Cybercombat + Attack
You Engage an Icon in Cybercombat
Damage Value
Sets the Base Damage Value of matrix Damage
Biofeedback Filter
Page 6
Sheet1
Page 7
Sheet1
Hacking + Defuse
if the Databomb is detected with use of a matrix perception test
make an opposed Test vs. Databomb/Corrupt rating x2, If Successful the Databomb/Corrupt program is
disarmed if not the Databomb/Corrupt program is set off and causes its damage
(or deletes the file in case of corrupt) and possibly deleting the file
Disarm
Disarm Program Extended Test
Hacking + Disarm 1 initiative pass
To Disarm a program the hacker must make an extended test with a threshold equal to (Firewall + System)
when the threshold is reached the targeted software can no longer be used against the hacker. The
Disarmed software still functions normally against others. Likewise the hacker is still vulnerable to
similar software used by others. Disarmed software remains neutralized until the software is reloaded
or until the hacker logs off the node
Firewalls may also be disarmed but in doing so make an extended test Analyze + Firewall (Stealth)
Each time the disarm attempt is made. If it meets the threshold before the disarm test succeeds then an alert is triggered
and the firewall immediately reconfigures its self so that the disarm attempt must be restarted
ECCM
ECCM Passive if Active
Add ECCM Rating to your Signal Rating when defending against Jamming
Exploit
Hack on the Fly Complex Action
Hacking + Exploit
you make a (Targets Firewall, Complex action) extended test when you reach the threshold you gain a user
account on that node. Adding +3 to the threshold gets you Security and +6 grants Admin. When you Beat the threshold and
gain the account you are automatically Logged onto the node with that level of access and do not need to use the Log on action
Each time you make a Hack on the fly attempt the target node makes a free analyze + firewall(Hackers stealth) Extended test
If the node detects you an alert is triggered even if you have succeeded
Mass Attacks
A mass attack is functionaly the same as Probing the target (see below) with a teamwork test Hackers and Technomancers
may work together on mass attacks, If successful all hackers involved gain access to the node. Agents and Sprites
cannot participate directly in the teamwork tests , but add a +1 die to the prim Characters Dice pool for each Agent or Sprite
assisting (Maximum +5)
Probing the target Extended Test
Hacking + Exploit 1 hour
Probing the target is an extended test (1 hour) with a threshold of the target nodes System + Firewall, once the threshold is
reached you have found a crack in the system’s defenses that you can exploit to gain access.
You do not automatically gain access; you have found the chink in the armor, but have not used it yet.
These Exploits do not last forever and may be removed if found by the nodes security or the node reboots
As Long as it remains on the node you may use the Log on action to enter the node with the hacked account
the Process grants you a user account +3 for Security +6 for Admin
When you first Log on the node gets 1 free analyze + Firewall (Hackers stealth) If the node detects you an alert is triggered
Crash Node Complex Action
Hacking + Exploit
Make an extended test (System + Firewall, Complex Action) when the threshold is reached the node is crashed and the
system reboots.
The Node issues a restricted alert (+4 Firewall against the offending Icon) Any Users in VR when the nodecrashes
must resist dumpshock when the node crashes, Including the hacker
Crash Program Complex Action
Hacking + Exploit
Page 8
Sheet1
Make an Opposed test vs. the targets System + Firewall. If you succeed you crash the program changing its status to loaded
Create Reusable Exploit Extended Test
Software + Exploit 1 initiative pass
Make an extended (Firewall+ system, 1 initiatiave) pass if you have at least security access on the node
Once Created this grants a +6 Dice pool modifier to gain access using the Exploit program
This can be sold or traded to other Hackers
Create Hidden Access point Extended Test
Hacking + Exploit 1 minuite
Make an extended test (Firewall + System, 1 minuite) to create a hidden access point. The advantage is that such hidden
access points make it very easy to penetrate the system, requiring only a simple Hacking + Exploit (1) Test,
and the Firewall gets no test to detect the intruder. As no account is being used, access won’t be noticed as long as the
intruding hacker remains under the radar of patrolling IC. Sinbce no passcodes have been have been obtained
the hacker must rely on hacking for all tests. Note that all actions taken by the hacker are recorded in the access log
but they are obscured and confusing because they are not tied to an account , the hackers Data trail can still be tracked
Mass Probing Extended Test
Hacking + Exploit (4) 1 day 1 day
Make the test Every hit beyond the threshold is equivilant to a reusable exploit in 5 nodes, For a legitimate account
For a legitimate account with personal access privilages add +3 to the threshold; Security +9 Admin + 16
Glitches indicate that one of the nodes is a honeypot
The GM decides what these specifc nodes are; more ofen then not they are poorly defended systems without
much to ofer, such as low-rating commlinks, public terminals, and minor workstations.
Unlike Standard hacking when the hacker makes the intrusion the node gets 2 free analyze + Firewall (Hackers stealth
BotNets with an exploit program can assist in a mass probe by adding 1 die for every bot used in the mass probing
to a max of the Hackers Hacking skill
Medic
Repair Icon Damage Extended Test
Computer + Medic Complex Action
Make a test vs (Damage Taken x2, Complex action) When the threshold is reached all damage is repaired
Nuke
Matrix Attack Action Complex Action
Cybercombat + Nuke
Nuke is a combat program that does not imflict matrix damage but instead hogs system recourses in an attempt
to freeze the target user Treat Nuke damage similar to a Matrix attack from an attack program however each box of
damage instead deducts 1 point from the targets Response or system/pilot in the case of agents or sprites
with appropriate effects on initiative, processor limit and subscription limits. The attacker determines which attribute
is affected by each point of nuke damage if Nuke reduces both values to 0 the targets persona freezes.
The User or Agent can take no matrix actions until he reboots
Sniffer
Capture Wireless Signal Complex Action
Electronic Warfare + Sniffer(3)
you evesdrop on wireless traffic going to and from a device you must succeed in a test to start the capture
then you may copy, record, or forward the trafic without another test as long as you remain in mutual signal range
and keep the sniffer program running.There is no way for other parties to detect your capture
(without access to your commlink)If the traffic is encrypted you must break the encryption before it van be captured
Page 9
Sheet1
you intercept traffic between 2 nodes you must have access to a node through which all all trafic passes
if the traffic is being split between intermediate nodes (see Matrix Topology, p. 216), you cannot
intercept it unless you have an icon in all nodes through which the trafc is routed
to Evesdrop on the traffic you must make a test, the hits on this test is the threshold for others to
detect the snooping with a matrix perception test
Hacking + Sniffer
The traffic may be copied and recorded or forwarded to a third party with no additional tests. If you want
to block or alter some of the traffic before sending it along, you must use the Edit action. To insert fake traffic,
you must succeed in an Opposed Test vs. the recipient’s Firewall + System.
Spoof
Redirect Trace Complex Action
Hacking + Spoof
Make an oppsed test vs tracking Icons Computer + Track. The Number of hits are added to the threshold that the
tracking Icon Needs . You may take this action multiple times on the same Icon
Spoof Command
Hacking + Spoof
you send a command to a device or agent. You must have the access ID from which the target accepts commands
(usually by making a matrix perception testor by tracing the its Icon. To Spoof the targetChoose a command
(See issuing command)and make a test vs the targets Pilot + Firewall (System + firewall for peripherial devices)
(Usually Device Rating x2) if you succeed the target acceots the command as legitimate, Each Spoof
command action only works for1 command Multiple commands require multiple spoof commands
Spoofing Commands from a user that has Security or Admin privilages is more difficult Apply a dicepool modifier
of -3 if the useer has Security access or a -6 if the user has admin acess
Spoof Access ID Complex Action
Hacking + Spoof(2)
change your access ID before you access other nodes
Spoofing Datatrail online Complex Action
Hackign + Spoof(2)
this action will automatically close your connection to othert nodes(after all you are no longer who you said you were)
if Black IC has Jammed your connection open then this requires an opposed test vs. the IC Rating + Response
Spoofing Protection Complex Action
Hacking + Spoof
if you are up against a user with an offensive program with the limitation option you may attempt to spoof the persona
so that the offensive program will not work against yo, this is an opposed test vs the opponents Analyze + Response
Spoofing Life Extended Test
Hacking + Spoof 1 day
A hacker can improve his life for 1 month by making an extended test (1 day) with a Varying threshold
The Spoofing Life Table is on page 99 and 206 in Unwired
Stealth
Matrix Perception test
Hacking + Stealth (Users) or Firewall + Stealth(Programs or nodes)
A stealth program turns the matrix perception test into an opposed test
Against Track Passive if Active
Stealth Rating is used as a negative dice pool modifier for a Track program
When Hacking
Stealth is the threshold for the systems firewall to detect intrusion
Decoys
by using a stealth program on a node or file it can appear Larger or smaller, filled with a high rating data bomb,
Page 10
Sheet1
Technomancers
E- Sensing Table
1 hit Presence and direction of the electrical feld’s source; whether the source acttively
projects any electromagnetic signals
2 hits Relative size and type of the source (metahuman vs. electrical device);.
Signal rating of any emitting devices; presence of cyberware implants
3 hits Type and model of node (RFID tag, commlink, cofee machine, drone, sensors);
determine whether person is a technomancer; location of cyberware implants.
5 + hits Firewall rating of node; presence of nanites in the bloodstream; whether a node is
slaved; presence of stealth tags.
Page 11
Sheet1
Firewall Willpower
Response Intuition (+1 in full VR)
Signal Resonance ÷ 2, round up
System Logic
Page 12
Sheet1
based on his stream, then Choose the rating preform a compile sprite test making an opposed test
vs the Sprites rating each net hit is 1 service owed the technomancer
this process brings an unregistered sprite to the technomancer
Compiling sprites causes Fading
Registering a sprite Rating in hours
Registering + Resonance
Make an opposed test vs the sprites rating x2 the technomancer needs at least one hit to register the sprite
additional net hits are added to the number of tasks the sprite owes the technomancer, a registered sprite
will not vanish after 8 hours but will remain on calluntill the last of its tasks are used. A Technomancer
may have a number of registered sprites equal to his charisma
Decompile Sprite Complex Action
Decompiling + Resonance
A technomancer may attempt to decompile a sprite (his or not) back into the bits of data that formed it
make a test vs the Sprites rating (+ the controllers resonance if registered) if the decompiling
technomancer wins then he reduces the tasks owed by 1 per net hit, if the tasks are reduced to 0 the sprite
will dissappear on its next action, any technomancer on hand may attempt to recompile the sprite before it leaves
bringing it under their control
Win or Loose the technomancer must resist fading as if he comhad compiled the sprite
Sprites are on Page 242 in the Core book and pages 154-156
in Unwired
Sprite Powers
Assult
The sprite with this power makes 2 attacks as if it were using 2 weapons in ranged combat
instead of splitting the Dice pool in half however the only the sprites pilot rating is halved
adding each attack complex form to 1 half or the other(it must have 2 Attack complex forms)
Assult is a single attack and can only be executed once against an Icon for the duration of the combat
Casteling
A sprite with this power using a complex action can redirect damage targetd at the technomancer to
its self by mimicing the technomancers access ID
Cookie Complex Action
the Sprite “Tags” an Icon with a hidden piece of code that can be used to track a matrix Icons ativities
the Sprite makes an opposedtest between the sprites rating x2 vs. the targets firewall +stealth if the sprite
succeeds the cookie is imbedded in the Icon and will log every place the Icon goesand everything it does
use the net hits to benchmark the depth of the information the cookie accumulates
Cookies may be detected with a matrix perception test(4) and removed with a computer + edit(2) test
(with or without resonance) once identified
Page 13
Sheet1
Test with each hit adding 1 die to the character's test to use or repair the device up to a
maximum of of the characters Skill
Electron Storm Complex Action
This attack allows the sprite to engulf the Icon in a sustained barrage of corrupted signals
when the sprite successfully hits the target in cybercombat, it swallows the target in a
Hail of digital pulses. With the first attack and on each of the sprites action phases it
inflicts (Rating)DV Matrix damage with an AP of -2, Resisted as normal while engulfed
the target suffers a -2 to all matrix actions. The target may break free of the storm by
Taking a complex action and beatign the sprite in an opposed Response x2 test
Gremlins
this power causes devices to mysteriously malfunction, the sprite must be in the node of the device
or in another node to which the device is subscribed. Make an opposed test between the sprites
rating x2 and the devices system + Firewall. If the sprite succeeds then the device suffers a glitch
the GM Chooses the malfunction appropriate to the device and situation. If the Sprite scores 4
or more hits it is a Critical Glitch
if used against a Drone or Vehical the power can be used to force the driver to make a crash test
the Sprites Rating serves as a negative dice pool to the crash test
Hardening
a Sprite with this power can temporarily empower its armor complex form to function like
Hardened Armor allowing the sprite to soak damage from most sources as long as it
continues to use this power. Using this power counts as a complex action much like
going on full defense
Hash
Ths power allows the sprite to temporarily encrypt a file with a unique resonance algorithm
in such a way that only the sprite can encrypt it. The sprite must remain with the hashed file
if it leaves the file reverts to normal. If the sprite is destroyed the file is corrupted and becomes worthless
Info Sortilege
Functions like the Echo (pg. 146 Unwired)except that it uses rating instead of resonance
Probability Distribution
a sprite with this power can change the probability distribution of a Matrix action by Raising or Lowering
the ammount of of system resources allocated to preform it. To use this power the sprite makes a
test of Rating x2 against ½ the nodes response(Round up) as the threshold. If it succeeds either
increase or decrease the dice pool of the targeted test by a number of dice equal to ½ the sprites
rating (round up)
As this Requires a complex action the sprite must have delayed its action to use this power in order to affect anothers test
power in order to affect anothers test
Proficency
Tutor sprites possess Skillsofts that grant them understanding of one or more Technical, Vehical,or
Knowledge skills. It can teach these skills to anyone as well as assist a person in AR or VR like a
Virtual assistant, Similar to an autodoc or an Autosoft for Humans, when the sprite guides a user
through a complex task who does not posses the skill in question , the character may preform the skill
without any modifiers, counting ½ the sprites Rating(Round up)as the level of skill
Assisting someone in this way is generally more time consuming than normal and therefor requires a
Complex or Extended testdepending on the situation
Steganography
The Sprite can conceal a file (or other piece of Datawithin another file in such a way as to make it invisible
to searches and datamining. Concealed files cannot be found with a standard data search the only way
to find the file is with a successful Matrix Perception(4)Test. Even the Sprite must make this test in order
Page 14
Sheet1
Page 15