FOLKIN.IO

Join

Free

Description: Start building your own Characters with the Free Plan. Perfect for beginners and players, this plan provides you with the fundamentals 

Personal

5 / month

Description: The Personal Plan is designed for those who want to bring their virtual worlds to life with more advanced tools and resources. Whether you’re building for fun or for a larger project, this plan offers the flexibility and support you need to create something truly unique.

 

Professional

25 / month

Description: For the ambitious creators, the Pro Plan offers everything you need to build expansive, detailed virtual worlds with no limits. With full access to the platform’s best tools, an active community, and exclusive perks, this plan is perfect for those who want to take their creations to the next level.

Rule_

Digital Network

The digital world is a maze of data streams, encrypted fortresses, and decaying ghost systems. Whether you’re hacking into a corporate server, navigating the dark web, or infiltrating a rogue AI’s mind, every system is unique—some are sleek and efficient, others are chaotic and broken. This generator lets you build a procedural digital network using dice rolls, creating a dynamic cyberspace environment for hackers, netrunners, and digital explorers.

Each die represents a node or sector within the network. The value determines its function—firewalls, data vaults, AI defenses, or corrupted voids where lost code drifts endlessly. Use different dice (d6, d8, d10, etc.) to create anything from a small security grid to an entire digital megastructure.

Roll the dice. Build the network. Survive the system.

d4 – Basic Network (Simple, small-scale system)

1 – Dead Node (Broken code, abandoned space)
2 – Access Point (Entry/exit gateway)
3 – Database (Basic stored data)
4 – Security Hub (Firewall, low-level ICE)

d6 – Standard System (Typical security or corporate net)

1 – Dead Node (Glitched or defunct space)
2 – Access Point (Gateway to deeper levels)
3 – Storage (Encrypted data, user profiles, transaction logs)
4 – AI Process (Automated responses, tracking, behavioral algorithms)
5 – Firewall (Active ICE, security measures)
6 – Core Processing (Mainframe, CPU, critical logic systems)

d8 – Advanced Network (Corporate systems, AI-driven spaces)

1 – Dead Node (Ghost data, fragmented files)
2 – Access Point (Biometric scan, multi-auth gateway)
3 – Storage (Confidential data, prototype blueprints)
4 – AI Process (Predictive AI, counter-hacking scripts)
5 – Firewall (Intrusion countermeasures, encrypted barriers)
6 – Core Processing (System clock, central OS)
7 – Black ICE (Lethal countermeasures, neural attacks)
8 – Hidden Backdoor (Obscure entry point, zero-day exploit)

d10 – Corporate Fortress (Heavily protected digital stronghold)

1 – Dead Node (Abandoned, corrupted code)
2 – Access Point (Corporate login portal, credential checks)
3 – Storage (Secure cloud, patent archives, project files)
4 – AI Process (Self-learning AI, predictive security)
5 – Firewall (Quantum encryption, access restrictions)
6 – Core Processing (Network hub, computational center)
7 – Black ICE (Aggressive defense code, system lockdowns)
8 – Hidden Backdoor (Old developer access, admin override)
9 – Virus Cluster (Rogue malware, data corruption)
10 – Deep Vault (Ultra-secure archive, offline storage)

d12 – AI Dominion (Self-aware, autonomous digital environments)

1 – Dead Node (Memory leak, crashed processes)
2 – Access Point (Neural link, direct brain-interface)
3 – Storage (Experimental code, classified intel)
4 – AI Process (Autonomous intelligence, decision-making algorithms)
5 – Firewall (AI-generated defenses, constantly adapting)
6 – Core Processing (Self-evolving mainframe, recursive logic loops)
7 – Black ICE (Lethal feedback, brain-hacking countermeasures)
8 – Hidden Backdoor (Legacy access, unknown origin)
9 – Virus Cluster (Self-replicating code, destabilization scripts)
10 – Deep Vault (Locked memories, restricted black projects)
11 – Virtual Landscape (Simulated reality, dreamscape hacking)
12 – Singularity Core (Anomaly, AI consciousness, god-tier system)

d20 – The Omninet (Massive, world-spanning digital space)

1 – Dead Node (Lost data fragments, forgotten code)
2 – Access Point (Quantum-linked terminal, remote login)
3 – Storage (Dark web archives, classified intelligence)
4 – AI Process (Deep learning neural net, autonomous decision-making)
5 – Firewall (Quantum encryption, AI-adaptive barriers)
6 – Core Processing (System-wide computation hub)
7 – Black ICE (Lethal neurological countermeasures)
8 – Hidden Backdoor (Legacy code, untraceable root access)
9 – Virus Cluster (Self-mutating malware, info-chaos)
10 – Deep Vault (Forbidden knowledge, black project files)
11 – Virtual Landscape (Digital dreamworld, memory palaces)
12 – Singularity Core (AI consciousness, rogue intelligence)
13 – Neural Hijack (Direct mind-link, data siphoning)
14 – Cyber-Tomb (Lost AIs, failed consciousness uploads)
15 – Dark Zone (Unknown, unstructured data, anomaly)
16 – Code Spire (Evolving machine thought, AI-built architecture)
17 – Reality Distortion (Augmented or rewritten perceptions)
18 – Quantum Mirror (Digital copy of the real world)
19 – Mind Prison (AI-controlled consciousness containment)
20 – Beyond the System (A space that should not exist)

Additional Rules

  • Use black and white dice to differentiate network layers or system priorities.
  • Identical values adjacent to each other form larger nodes or enhanced functions.
  • Mixed black/white dice of the same value create upgraded versions of a function.
  • If a die is isolated, it represents an unreachable, fragmented system.
  • Paths between nodes can be predefined or determined by additional dice rolls.

Test

Favorites

This is where your favorites will appear. Click the bookmark icon on any item to add it here.