The following homebrew adds a modern option to the Rogue class in 5E TTRPGs. All of the core Rogue class abilities can stay rules as written; see the official 5E System Reference Document (SRD v5) for details. Note: This subclass has not yet gone through playtesting.
Netrunner
You are a ghost in the machine: A hacker, infiltrator, and digital assassin who can slip through both physical and virtual defenses. With a neural uplink and a pocket arsenal of code injectors, you can dismantle security systems, manipulate drones, and turn technology itself into a weapon. Netrunners move faster than the grid can register, striking from data shadows where others see only static.
Level 3: Cyber Intrusion Protocols
You’ve been augmented to interact directly with machines and networks. You gain the following features:
Interface Jack. You can connect directly to any digital or magical-technical system within 5 feet as an Action. While connected, you can use Intelligence checks in place of Dexterity (Thieves’ Tools) checks to bypass security systems, open locks, or disarm traps.
Quick Hack. You can use your Bonus Action to perform one of the following:
* Data Spike. Make a ranged spell attack (range 30 ft) against a visible creature or device linked to a network. On a hit, it takes lightning or psychic damage (your choice) equal to your Sneak Attack dice (no modifiers).
* System Scramble. Force a device (camera, drone, or automated turret) within 30 feet to malfunction until the start of your next turn. It can’t target or record you during that time.
* Hacking Kit Proficiency. You gain proficiency with the Hacking Kit (computers and networks). If already proficient, you gain double proficiency for related checks.
Level 3: Neural Mobility Suite
You’ve optimized your nervous system for high-speed action both in physical and digital space.
Reflex Enhancements. You gain a Climb Speed equal to your Speed, and you can use Dexterity instead of Strength for jump distances.
Tactical Overlay. When you take the Hide action while near electronic cover (machinery, vehicles, drones, terminals), you gain advantage on the roll as your cybernetic HUD maps line-of-sight and threat vectors in real time.
Level 9: Ghost in the System
You’ve learned to remain invisible across data and physical sensors. You gain the following Cunning Strike option:
Digital Cloak (Cost: 1d6). When you hit a target connected to a network (cyberware user, drone, security system), you can activate your cloak. Until the start of your next turn, you are invisible to cameras, drones, and sensors, and attacks against you from such systems have disadvantage. If you end your turn behind Total Cover or in digital concealment (darkness, interference, or jamming), you remain hidden.
Level 13: Code Reconstructor
You can repurpose corrupted or restricted systems, even ones that weren’t built for you.
Expanded Interface. You can connect to and attune to up to four cybernetic or digital devices at once (including AI companions, drones, or magic-tech items).
Overclock. When you use an item that expends energy cells, charges, or data tokens, roll 1d6. On a roll of 6, the effect functions without expending a charge.
Code Injection. You can use any data drive or Spell Scroll that involves energy manipulation, illusions, or communication, using Intelligence as your spellcasting ability. If it’s a cantrip or 1st-level effect, it succeeds automatically. For higher levels, make an Intelligence check (DC 10 + spell level). On success, the effect executes; on failure, the file corrupts or the hardware fries.
Level 17: Quantum Reflexes
Your mind moves faster than the world around you. You can take two turns during the first round of any combat. You take your first turn at your normal initiative and your second turn at initiative −10.
You can use this feature even if you are Surprised, but not if you are Incapacitated.
On your second turn, you have advantage on all Dexterity saving throws and Technology checks, and you can make one additional Data Spike or Sneak Attack as a free action against a valid target.
Once you use this feature, you can’t use it again until you finish a Short or Long Rest.