Cherreads

My Cyberpunk 2077 Simulator

SrMagnus
28
chs / week
The average realized release rate over the past 30 days is 28 chs / week.
--
NOT RATINGS
10.4k
Views
Synopsis
[Cyberpunk + Edgerunners Fanfic] Lin Mo still remembers the original tagline of the game: “In 2077, my city was voted the worst place to live in America.” Now, he stands atop a skyscraper, gazing down at the city under the cover of night. In the corporate plazas, flames engulf the towers of various megacorps. Crowds surge below, screams and wails echoing through the chaos. And yet, Lin Mo feels nothing but boredom. Maggots feast on marrow. The innocent are puppeteered as flesh and fuel — expendable kindling for the blaze. This city is rotten to its very core. So no — fire alone isn’t enough. Fire may scatter the darkness, but when it dies out, it cannot bring light. Darkness endures. That’s why he must gather the strength of everyone — and become the eternal daylight that this city so desperately needs! An overwhelming light casts the deepest shadow. That light… is the sun! … Through a simulator, Lin Mo arrives in the world of Cyberpunk. At first, he believes he can carve out a place for himself in Night City. But then— “Lin Mo, about that gig…” “Hey Lin Mo, I just picked up a second-hand ride for my garage, take a look…” “Lin Mo, your name’s all over Night City these days! Why don’t you take a look at this job while you’re at it?” Damn it— I’ve become the biggest sucker in town!
VIEW MORE

Chapter 1 - Minor Lore on Hacking Knowledge

Glossary of Terms

RAM: Temporary data storage medium (main memory). Think of it like a spell slot or mana bar for a hacker. The amount of RAM available usually depends on the netrunner's Cyberdeck and their Intelligence stat.

ICE: Intrusion Countermeasure Electronics — the digital firewalls of the Net.

Quickhacks: Offensive hacking programs — instant-use hacks. Comparable to a mage's instant-cast spells.

Breach Protocol: The hacker's infiltration method. Each netrunner has their own approach, like solving an exam question. The more intelligent the hacker, the more powerful their Breach Protocol.

Daemons: Think of them as advanced viruses — but far stronger. For hackers, daemons are their ritual spells, often precompiled routines triggered during Breach Protocols.

Quickhack Components: Tiny chips that can be slotted into a Cyberdeck. These contain pre-installed daemons crafted by netrunners in advance.

They usually consume RAM to activate. These are large-scale daemons with major effects, often targeting the human body directly.

You can think of them like skills on a game's hotbar — unless you slot the component into your Cyberdeck, you won't be able to trigger the hack via hotkey.

Cyberdeck: Essential equipment for any netrunner. It lets them connect to vast datastreams at will.

Comparable to a mage's wand — but for netrunners, the Cyberdeck is even more vital. Without it, Quickhacks can't be used at all.

Different models of Cyberdeck can hold varying numbers of Quickhack Components.

The Cyberdeck also functions like a GPU — in a hacker's hands, it's their weapon. If your opponent is packing a high-end deck, it's like they're sniping you with a railgun while you're stuck with a pocketknife.

That said, if your Intelligence is sky-high — say, level 20 like Bartmoss — then even a low-end Cyberdeck will do. Death by a thousand stabs.

Additional Notes

Against different enemies, RAM consumption varies depending on the target's ICE strength within their neural processor.

A netrunner's own skill level affects upload speed.

If you're hacking a trusted teammate who has authorized access, it's as if they handed you their PC — all usual hacking restrictions are bypassed. Do as you please. (Like in Edgerunners, when Kiwi used System Reset on Rebecca.)

Daemon Types:

Daemons like Short Circuit, System Reset, and Cyberware Malfunction — those that directly affect the body — are considered large-scale daemons. These are too complex to improvise mid-combat, so they must be pre-installed via Quickhack Components.

Hacking is usually covert — like a virus infecting your computer. That said, getting caught is always a risk. (In-game, V gets a warning when being hacked, but during the story, V doesn't even notice when the Voodoo Boys implant a custom daemon — such as the "Light Chaser" — into his neural processor.)

[Reserved for future updates.]

Sample Hacking Procedure

When hacking a target, a netrunner typically has two options:

Option 1:

First, breach the local network's ICE. Once that's done, any device, neural processor (cyberbrain), or defense system connected to the network becomes vulnerable.

What happens next depends on the hacker's daemons and tools.

Since the ICE has already been bypassed, the netrunner gains a buff — making subsequent hacks far easier. From here on, the process mirrors Option 2.

Option 2:

If you're bold — or if there's no local net to breach — then you skip the warm-up and dive straight into the hack.

Hacking Methods: Physical vs Remote

Physical Invasion:

Directly connect via data cables. For small transfers, a personal link is enough, but diving into full cyberspace — which requires massive bandwidth — demands a neural link via cyberjack ports, often using a netrunner chair to boost brainpower and processing speed.

Remote Hacking:

Function 1: Remotely hack someone's neural processor, forcibly creating a direct data chain between you and the target.

This allows limited Quickhack deployment.

Because it's a single data chain, bandwidth is restricted. You can't chain from one target to another or affect other devices.

Only basic actions like Quickhacks and Daemon uploads are available.