+==============================+
|      D A R K P O O L //      |
+==============================+
+========= PROGRAM CATALOG =========+
|     50 programs · 5 types · 4 tiers     |
+===================================+
ATTACK · 30 DEFENSE · 20 · ◆ MYTHIC 5 ◆ EPIC 10 ◆ RARE 15 ◆ COMMON 20
// JUMP → KERNEL NETWORK CRYPTO SOCIAL HARDWARE
◇ KERNEL 10 programs
// ATTACK
◆ MYTHIC ATK
ROOTKIT_R7
POW 65
ACC 92
CRT 14
Lives below ring zero and pays no rent.
◆ EPIC ATK
BUFFER_SLAM
POW 85
ACC 78
CRT 10
Pushes data past the fence and into the next process's lap.
◆ RARE ATK
HEAP_OVERFLOW
POW 92
ACC 72
CRT 8
Spills memory until the kernel forgets where it lives.
◆ RARE ATK
RACE_COND
POW 70
ACC 85
CRT 18
Two threads, one resource, zero sportsmanship.
◆ COMMON ATK
NULL_DEREF
POW 78
ACC 82
CRT 12
Hands a process a pointer to nothing and watches it follow.
◆ COMMON ATK
STACK_SMASH
POW 88
ACC 75
CRT 7
Overwrites the return address with somewhere more interesting.
// DEFENSE
◆ EPIC DEF
STACK_GUARD
POW 75
ACC 90
CRT 10
A canary in the frame. It sings before it dies.
◆ RARE DEF
ASLR_PATCH
POW 80
ACC 85
CRT 8
Shuffles every address until the exploit forgets where to land.
◆ COMMON DEF
KMOD_LOCK
POW 85
ACC 80
CRT 8
Signed modules only. The kernel is not taking guests.
◆ COMMON DEF
SYSCALL_FILT
POW 70
ACC 92
CRT 12
A whitelist for what a process is allowed to want.
◇ NETWORK 10 programs
// ATTACK
◆ MYTHIC ATK
BGP_LEAK
POW 68
ACC 90
CRT 15
Announces routes you do not own to autonomous systems that believe you.
◆ EPIC ATK
SYN_STORM
POW 95
ACC 72
CRT 6
Half-open handshakes until the table can't hold them.
◆ RARE ATK
ARP_SPOOF
POW 72
ACC 88
CRT 12
Convinces the network you are the gateway.
◆ RARE ATK
DNS_HIJACK
POW 85
ACC 75
CRT 11
Resolves their requests to your basement.
◆ COMMON ATK
PACKET_RIP
POW 78
ACC 82
CRT 13
Tears headers open and reads what was meant for someone else.
◆ COMMON ATK
TCP_FLOOD
POW 80
ACC 80
CRT 10
Open every connection. Close none. Watch the queue weep.
// DEFENSE
◆ EPIC DEF
ICE_WALL
POW 78
ACC 88
CRT 8
Intrusion Countermeasures, Electrified. Old name. Still works.
◆ RARE DEF
PACKET_GATE
POW 82
ACC 82
CRT 10
Reads every header. Trusts none of them.
◆ COMMON DEF
DEEP_INSPECT
POW 75
ACC 90
CRT 9
The payload has nowhere to hide; the inspector reads it all.
◆ COMMON DEF
PORT_CLOAK
POW 85
ACC 80
CRT 8
Knocks required. The scanner sees only closed doors.
◇ CRYPTO 10 programs
// ATTACK
◆ MYTHIC ATK
KEY_FORGE
POW 88
ACC 74
CRT 9
Manufactures a private key from a public mistake.
◆ EPIC ATK
MITM
POW 75
ACC 85
CRT 11
Sits politely between two parties. Listens. Edits.
◆ RARE ATK
HASH_COLLIDE
POW 82
ACC 78
CRT 12
Two inputs, one digest, no integrity.
◆ RARE ATK
RAINBOW_HIT
POW 90
ACC 72
CRT 8
A precomputed table walks into a password file.
◆ COMMON ATK
PADDING_BLEED
POW 72
ACC 90
CRT 10
The error message tells you which byte you got wrong.
◆ COMMON ATK
TIMING_LEAK
POW 70
ACC 80
CRT 20
The clock tells you everything the cipher refuses to.
// DEFENSE
◆ EPIC DEF
CIPHER_LATTICE
POW 88
ACC 78
CRT 8
Post-quantum. The math is hard now and harder later.
◆ RARE DEF
KEY_VAULT
POW 85
ACC 82
CRT 8
Hardware-backed. The keys never leave the silicon.
◆ COMMON DEF
ENTROPY_POOL
POW 72
ACC 92
CRT 10
Genuine randomness, sourced from places you do not want to know.
◆ COMMON DEF
TLS_FORTRESS
POW 80
ACC 85
CRT 10
A ciphersuite list with no weak entries and no patience.
◇ SOCIAL 10 programs
// ATTACK
◆ MYTHIC ATK
COBALT_ECHO
POW 88
ACC 74
CRT 10
A beacon dressed as a normal employee email.
◆ EPIC ATK
PHISH_NET
POW 85
ACC 78
CRT 10
A login page so familiar nobody reads the URL.
◆ RARE ATK
JACKSUIT
POW 78
ACC 82
CRT 12
Wears another operator's credentials like a borrowed jacket.
◆ RARE ATK
PRETEXT_X
POW 70
ACC 88
CRT 14
You are the new vendor. They have your invoice.
◆ COMMON ATK
BAITWARE
POW 92
ACC 72
CRT 7
Free, irresistible, and signed by nobody.
◆ COMMON ATK
WETWARE
POW 65
ACC 92
CRT 15
The exploit lives between the chair and the screen.
// DEFENSE
◆ EPIC DEF
SANDBOX_X
POW 78
ACC 88
CRT 8
Every untrusted process plays in its own padded room.
◆ RARE DEF
INTENT_FILTER
POW 82
ACC 84
CRT 8
Reads the email twice and the sender's history once.
◆ COMMON DEF
CONSTRUCT
POW 85
ACC 80
CRT 10
A simulated environment for inputs that haven't earned trust.
◆ COMMON DEF
SIG_VERIFY
POW 72
ACC 92
CRT 10
Unsigned binaries do not run here. No exceptions, no excuses.
◇ HARDWARE 10 programs
// ATTACK
◆ MYTHIC ATK
ROWHAMMER
POW 95
ACC 70
CRT 8
Hits one DRAM row hard enough to flip the next.
◆ EPIC ATK
EMP_PULSE
POW 88
ACC 72
CRT 12
A single coil unmakes a season of patches.
◆ RARE ATK
BUS_PIRATE
POW 78
ACC 82
CRT 12
Clamps onto the bus and asks polite questions in raw voltage.
◆ RARE ATK
JTAG_DRAIN
POW 72
ACC 88
CRT 10
Pulls firmware out the debug port like a confession.
◆ COMMON ATK
CHIP_PEEL
POW 75
ACC 85
CRT 13
Decapsulate the die. Photograph the secrets.
◆ COMMON ATK
FIRMWARE_X
POW 82
ACC 78
CRT 11
Replaces the BIOS with one that loves you.
// DEFENSE
◆ EPIC DEF
TPM_LOCK
POW 78
ACC 88
CRT 8
Boot only what was measured. Refuse the rest.
◆ RARE DEF
CHROME_SHELL
POW 80
ACC 85
CRT 10
Tamper-evident enclosure. Open it and the keys self-erase.
◆ COMMON DEF
BIOS_SEAL
POW 88
ACC 78
CRT 8
The firmware is signed, sealed, and not interested in updates.
◆ COMMON DEF
POWER_DAMP
POW 85
ACC 82
CRT 8
Smooths the rail until the side-channel falls silent.

POW = damage / block · ATK·ACC = % clean hit (else ×0.5) · ATK·CRT = % crit ×1.5 · DEF·ACC = % HOLD (else BREAK ×0.5) · DEF·CRT = % COUNTER ×1.5
[ FULL COMBAT RULES → ]