[{"id":91447459929,"handle":"games","title":"Games","updated_at":"2023-05-27T10:50:36-05:00","body_html":"","published_at":"2019-02-07T16:03:12-06:00","sort_order":"best-selling","template_suffix":"","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"Board Game"},{"column":"type","relation":"equals","condition":"Expansion"},{"column":"type","relation":"equals","condition":"Role Playing Game"}],"published_scope":"global"},{"id":95379718233,"handle":"mothership","title":"Mothership","updated_at":"2023-05-27T10:50:36-05:00","body_html":"","published_at":"2019-08-14T17:23:05-05:00","sort_order":"manual","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Mothership"}],"published_scope":"global","image":{"created_at":"2020-04-21T16:23:46-05:00","alt":null,"width":1600,"height":702,"src":"https:\/\/cdn.shopify.com\/s\/files\/1\/0022\/2727\/3817\/collections\/Mothership-banner.png?v=1587504227"}},{"id":91426979929,"handle":"role-playing-games","title":"Role-Playing Games","updated_at":"2023-05-27T10:50:36-05:00","body_html":"","published_at":"2019-02-06T21:06:00-06:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Role Playing Game"}],"published_scope":"global"}]
2 page black and white pamphlet module. Written by Sean McCoy, Luke Gearing, and Kevin Whitlock Layout by Sean McCoy
*Hacking* in MOTHERSHIP® can be a lucrative, if dangerous, skill for any crewmember to acquire. It can open doors, control gun turrets and expose sensitive information.
Most *Hacking* checks are simple: an electronic airlock is locked and the Hacker makes an Intellect (*Hacking*) check and if they succeed the door is opened. Easy.
However, if your scenario requires a more robust challenge, say hacking into corporate research station’s primary database, you may want to design a **NETWORK**.
The Mothership Hacker's Handbook includes all the tools you need to create robust hacking challenges in Mothership or any other cyberpunk or sci-fi game. It includes:
A brand new loadout for character creation: The Exploitation Loadout.
Intuitive and simple rules and guidelines for building Networks for your players to hack.
A Response table for when your players fail their hack.
A new system for "User Accounts" that allow everyone (not just Hackers) to get in on the action.
A new equipment section with tons of tools, decks, gear, and single-use software to aid in your intrusion attempts.
This supplement is suitable for characters of any level.