GithubHelp home page GithubHelp logo

breachprotocol's Introduction

Breach Protocol Quickhack

An implementation inspired by the Breach Protocol Quickhack in Cyberpunk 2077.

Please leave a ⭐ if you like it!

About Breach Protocol

Breach Protocol is a specific kind of Quickhack that uploads Daemons onto a network. When you have a Cyberdeck, you can perform Quickhacks. Quickhacks work so long as you have RAM to pull it off. The default Quickhack that every Cyberdeck has is Breach Protocol. Breach Protocol breaks through a network's security and uploads Daemons. Daemons are programs that affect everything on the network for a period of time. Which Daemons get uploaded is determined by which sequences you complete successfully. You might see network security referred to as Intrusion Countermeasures Electronics (ICE), such as with ICEPick Quickhack Daemon. Networks are more geographical than an actual network of interconnected devices. Networks are made up of all people and devices in a location. You'll use Breach Protocol to decode Encrypted Shards or access networks.

You’ll see a list of Daemons available to upload during Breach Protocol. Each Daemon comes with a sequence of characters that you’ll need to slot into your buffer via the matrix — in order — to upload it and gain its effect.

When you start selecting characters from the matrix, you have to start in the first row. You can select any character across that top row. The next character you select has to be in the same column as the first character you selected. The third has to be in the same row as the second. The fourth has to be in the same column as the third. That sequence of alternating between row and column keeps repeating from there.

Since you’ll have more Buffer slots than characters in the various Daemons’ sequences, you might be able to complete multiple sequences in the same buffer.

The buffer is the maximum number of characters you can choose in the matrix. You don’t have to (and often won’t) choose that many, but the size of your buffer is the max. You’ll start with four buffer slots. To get more buffer slots, you’ll need to acquire a new Cyberdeck from a ripperdoc. Your buffer slots are directly correlated with the amount of RAM of your Cyberdeck.

Try it out

The project is live here.

If you find any errors ⛔, please report them to [email protected]

About Me

Hi! 👋 I'm Kevin, a full-stack developer and passionate blockchain enthusiast from Ohio, USA. Please take a look at my portfolio.

Here's how you can get in touch with me:

Like my work or love coffee as much as I do? You can support me by donating to this address!

0x0BCB197132Ac1206c54341e44Ef062424473488B

breachprotocol's People

Contributors

mccarthykp avatar

Stargazers

Emily Weyda avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.