Hackers Wikia
Hackers Wikia

  Български - Атакуващи  简体中文 - 进攻病毒  正體中文 - 暴力程式  Čeština - Útočné  English - Offensive  Français - Offensif  Deutsch - Offensiv  Bahasa Indonesia - Program Penyerangan  Italiano - Offensivi  日本語 - 攻撃  Bahasa Malayu - Penyerang  Polski - Ofensywne  Português - Ofensivo  Română - Ofensiv  Русский - Атакующие  Español - Ofensivo(Español)  Türk - Saldırı  Tiếng Việt - Chương trình tấn công tổng lực

Battering ram.png Ion cannon.png Blaster.png Kraken.png
Battering Ram Beam Cannon Blaster Kraken
Maniac.png Shuriken.png Shock.png Worms.png
Maniac Shuriken Shocker Worms


Offensive programs are the basic tools of hacking. Viruses such as Beam Cannon, Worms, or a mighty Kraken have the potential to overwhelm any Security Nodes on a network by sheer force. This method of attack is referred to as "Brute Force" and differs significantly from the more subtle Stealth hacking.

  • Beam Cannons are the basic virus, focusing on a node until it is captured.
  • Shurikens are similar to Beam Cannons, but attack all connected nodes simultaneously.
  • Worms can replicate themselves, quickly spreading throughout a network.
  • Blasters are extremely powerful and stun nodes for a short time, but are slow to install and fire, and take up more space.
  • Battering Rams target Code Gate filters and Guardian shields.
  • Shockers stun connected nodes, preventing attacks and regeneration.
  • Krakens start from the netConnections and head straight for the Core, combining their strength as the tentacles meet.
  • Maniacs deliver massive kamikaze attacks, but can only be used once and take up a large amount of disk space.


Each program takes a certain amount of time to be installed on a node, during which the program is not active. However, if the node is recaptured by the network in that time, the program will be lost. Each program also takes a certain amount of disk space, which it occupies in program libraries once it is compiled. Finally, each program also takes a certain amount of time to assemble in the Compiler. Programs can be compiled instantly by using Credits.

Offensive Program Statistics
Program Install
Beam Cannon 1.0 Seconds 1 20 Seconds
Shuriken 1.0 Seconds 1 30 Seconds
Worms 1.0 Seconds 3 1 Minutes
Blaster 5.0 Seconds 6 5 Minutes
Battering Ram 2.0 Seconds 5 10 Minutes
Shocker 0.5 Seconds 6 8 Minutes
Kraken 1.0 Seconds 7 8 Minutes
Maniac 0.5 Seconds 15 30 Minutes

Attack Priorities[]

Different programs have different methods of attack, and may have additional, special abilities such as stunning or attacking every connected node. When an offensive program has a choice of which node to attack, it will select a target using the following criteria:

Priority list: (Updated for v.1.2 - see Patch Notes)

  1. Security Nodes with a Strength value - Sentry, Turret and Black ICE - and A.I. Nodes which have an antivirus installed. Other Security Nodes - Guardian, Scanner and Code Gate - are considered regular nodes in this regard.
  2. White A.I. Nodes which do not have an antivirus installed.
  3. The Core, regardless of antivirus status, including a Core that is upgrading.
  4. Any other Black Nodes - Nodes with an installed antivirus.
  5. Partially Black Nodes - Nodes where an antivirus is currently being uploaded.
  6. White Nodes and Upgrading Nodes - Nodes which are upgrading and Nodes where an antivirus is not present (including upgrading Security Nodes, but not including an upgrading Core).
  7. Nodes under the Wraith effect.

As of Patch v1.025, if multiple connected nodes fall under the same category, programs will prioritize nodes with the highest firewall first. If these nodes also have the same firewall value, programs will prioritize the node which the defender attached first.[1]


The Brute-Force attack was most likely named after the real life Brute-Force attack, where decoders would try many passwords or passphrases with the hope of eventually guessing correctly.


Hackers Wikia - Programs List
Programs Nodes Gameplay
Offensive Programs

Battering ram.png Battering Ram  Ion cannon.png Beam Cannon  Blaster.png Blaster  Kraken.png Kraken 
Maniac.png Maniac  Shock.png Shocker  Shuriken.png Shuriken  Worms.png Worms 

Defensive Programs

Icewall.png ICE Wall  Protector.png Protector 

Stealth Programs

Access.png Access  Dataleach.png Data Leech  Portal.png Portal  Wraith.png Wraith 

A.I. Programs

Beetle.png A.I. Beetle  Hawk.png A.I. Hawk  Squid.png A.I. Squid