FANDOM


Summary Edit

Programs are specialized viruses designed to hack through network securities and firewalls, and download valuable data and resources. Programs are created by compiling them, and are subsequently stored in program libraries. Players start with a basic offensive program available, the Beam Cannon, but can research new programs and upgrade them with the Evolver.

All programs have three main characteristics: Install Time, Disk Space and Compilation Time.

  • Install Time: the amount of time it takes to install onto a node.
  • Disk Space: the amount of space the program uses up in the Program Library.
  • Compilation Time: the amount of time required to write the program in the Compiler.

Stealth, Offensive and Defensive programs have additional values specific to their type which open up different ways of attacking and defending against other networks.

Program Types Edit

Offensive Edit

Battering ram Ion cannon Blaster Kraken
Battering Ram Beam Cannon Blaster Kraken
Maniac Shuriken Shock Worms
Maniac Shuriken Shocker Worms

Offensive programs are the primary tools needed to hack a network, and are used to deplete firewalls and Guardian shields, as well as destroy Code Gate filters and stun Security Nodes.

  • Beam Cannons are the basic virus, focusing on a node until it is captured.
  • Shurikens are similar to Beam Cannons, but attack all connected nodes simultaneously.
  • Worms can replicate themselves, quickly spreading throughout a network.
  • Blasters are extremely powerful and stun nodes for a short time, but are slow to install and fire, and take up more space.
  • Battering Rams target Code Gate filters and Guardian shields.
  • Shockers stun connected nodes, preventing attacks and regeneration.
  • Krakens start from the netConnections and head straight for the Core, combining their strength as the tentacles meet.
  • Maniacs deliver massive kamikaze attacks, but can only be used once and take up a large amount of disk space.

Defensive Edit

Icewall Protector
ICE Wall Protector

Defensive programs provide extra protection against network securities, allowing offensive programs to capture tough nodes.

  • ICE Walls offer basic protection, intercepting damage before it reaches a node.
  • Protectors can regenerate their buffer, greatly increasing the time before a node is recaptured.

Stealth Edit

Access Dataleach Portal Wraith
Access Data Leech Portal Wraith

Stealth programs allow Security Nodes to be disabled, resources to be looted, and backdoors to be established inside the network before the security is even activated.

  • Data Leeches can be used in Brute Force or Stealth hacks to download resources and data at an increased rate.
  • Access allows other stealth programs to be installed on connected nodes.
  • Wraiths disable any node on which they are installed for the duration of a hack, preventing any special abilities from being active or any antivirus from spreading.
  • Portals capture nodes on which they are installed in stealth, allowing offensive and defensive programs to be installed at the beginning of a Brute Force hack.

Install Time Edit

Each program takes a certain amount of time to be installed on a node, during which the program is not active. However, if the node is recaptured by the network in that time, the program will be lost.

Offensive Programs
Program Install
Time
(seconds)
Beam Cannon1.0
Shuriken1.0
Worms1.0
Blaster5.0
Battering Ram2.0
Shocker0.5
Kraken1.0
Maniac0.5
Defensive Programs
Program Install
Time
(seconds)
ICE Wall0.5
Protector4.0
Stealth Programs
Program Install
Time
(seconds)
Data Leech1.0
Access1.0[1]
Wraith2.0
Portal6.0


Disk Space Edit

Each program takes a certain amount of disk space, which it occupies in program libraries once it is compiled.

Offensive Programs
Program Disk
Space
Beam Cannon1
Shuriken1
Worms3
Blaster6
Battering Ram5
Shocker6
Kraken7
Maniac15
Defensive Programs
Program Disk
Space
ICE Wall2
Protector4
Stealth Programs
Program Disk
Space
Data Leech3
Access1
Wraith5
Portal10


Compilation Time Edit

Each program also takes a certain amount of time to assemble in the Compiler. Programs can be compiled instantly by using Credits.

Offensive Programs
Program Compilation
Time
Beam Cannon20s
Shuriken30s
Worms1m
Blaster5m
Battering Ram10m
Shocker8m
Kraken8m
Maniac30m
Defensive Programs
Program Compilation
Time
ICE Wall2m
Protector5m
Stealth Programs
Program Compilation
Time
Data Leech30s
Access1m
Wraith15m
Portal20m


Notes Edit

  1. When Access is placed on a Code Gate with an active filter, the installation time is increased according to the filter statistic:
     \scriptstyle\text{Installation Time} \; {=} \, \tfrac{1}{(1-\mathrm{F})} \; \scriptstyle\text{seconds}
    Where F = Code Gate Filter
Hackers Wikia - Programs List
Programs Nodes Gameplay
Offensive Programs

Battering ram Battering Ram  Ion cannon Beam Cannon  Blaster Blaster  Kraken Kraken 
Maniac Maniac  Shuriken Shuriken  Shock Shocker  Worms Worms 

Defensive Programs

Icewall ICE Wall  Protector Protector 

Stealth Programs

Access Access  Dataleach Data Leech  Portal Portal  Wraith Wraith 

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.