What you can do as a member?
You can do by logging in.
- Retention of various tool data
- Site theme change
- Game bookmarking feature
- Provide feedback on the website
★ 2.1 Update and Ultimate Edition are now available!
┗ NEW: Metro System, Car Racing, Romantic Hangouts
★ Phantom Liberty: Dogtown Map & Relics System
★ See our Best Update 2.0 Builds here!
┗ HOT: Blades Build, Netrunner Build, & Assassin Build
★ Update 2.0: Changes to Perks, Cyberware, & UI
This is a guide to the Breach Protocol Skill Tree in Cyberpunk 2077. Learn how to level up the Skill Progression for this Skill Tree, all Perks available, and how to unlock all its Perks.
List of Contents
Successfully Breach computers and access points.
1 | 2 | 3 | 4 |
---|---|---|---|
- | +1 Perk Point(s) | Increases Breach Protocol Time by 5%. | Increases Components Acquired by 10%. |
5 | 6 | 7 | 8 |
Increases Breach Protocol Time by 5%. | +1 Perk Point(s) | Increases Breach Protocol Time by 5%. | Increases RAM by 1. |
9 | 10 | 11 | 12 |
Increases Components Acquired by 10%. | +1 Perk Point(s) | Increases Breach Protocol Time by 5%. | Increases Components Acquired by 10%. |
13 | 14 | 15 | 16 |
Increases RAM by 1. | +1 Perk Point(s) | Increases Breach Protocol Time by 5%. | +1 Perk Point(s) |
17 | 18 | 19 | 20 |
Increases Components Acquired by 10%. | +1 Perk Point(s) | Increases Buffer Extension by 1. | Unlocks the last Perk in the Skill tree. |
Perk | Attr. Level | Effect at Lv. 1 | Rating & Reason |
---|---|---|---|
Transmigration | Level 16 in Breach Protocol | Increases the breach time of Breach Protocol by 50%. |
Longer Breach Protocol time is not necessary to successfully Breach Protocol. |
Big Sleep | 3 | Unlocks the Big Sleep daemon, which disables all cameras in the network for 3 min. |
Not having to worry about cameras for awhile without having to spend RAM and hacking each one individually is convenient and efficient. Mandatory if you wish to use Hackathon and Efficiency. |
Mass Vulnerability | 3 | Unlocks the Mass Vulnerability daemon, which reduces the Physical Resistance for all enemies in the network by 30% for 3 min. |
Increases your overall DPS against every enemy with a quick Breach Protocol. |
Almost In! | 5 | Increases the breach time for Breach Protocol by 20%. |
The increased time for Breach Protocol is not very useful as you should be planning ahead before starting on the hack. Making the need for more time redundant. Can help you when you make a mistake or when there are many Daemons you can upload. |
Advanced Datamine | 5 | Upgrades the Datamine daemon, increasing the amount of eurodollars acquired from Access Points by 50%. |
More eddies to spend is always welcome. |
Mass Vulnerability: Resistances | 7 | Upgrades the Mass Vulnerability daemon, reducing all Resistances for enemies in the network by 30%. |
Decreases all resistances making Mass Vulnerability help you deal even more damage. |
Extended Network Interface | 7 | Automatically highlights nearby Access Points. |
Access points already show up when you are near them, having them highlighted is just redundant. |
Datamine Mastermind | 9 | Upgrades the Datamine daemon, increasing the amount of components acquired from Access Points by 50%. |
You get more components for crafting Quickhacks. If you are using a Netrunner build, getting this as soon as possible is important in order to have enough material to craft higher tier Quickhacks. |
Turret Shutdown | 9 | Unlocks the Turret Shutdown daemon, which disables security turrets in the network for 3 min. |
A weaker version of Turret Tamer. Can still be used to activate Efficiency and Hackathon perks. |
Total Recall | 11 | The ICEpick daemon reduces all quickhack costs by an additional 1 RAM unit(s). |
This makes Icepick even stronger. Allowing you to use more Quickhacks. A must have against high level enemies. |
Turret Tamer | 12 | Unlocks the Turret Tamer daemon, which sets the status of every turret in the network to friendly for 3 min. |
Very powerful if there are turrets in the network. Can help proc Hackathon and Efficiency. |
Datamine Virtuoso | 12 | Upgrades the Datamine daemon, increasing the chance to acquire a quickhack from Access Points by 50%. |
Even with the increased 100% chance, the odds of getting a Quickhack is low. There is a chance of getting Epic Quickhacks, but that requires a lot of Datamining and some luck. |
Cloud Cache | 14 | Completing a Breach Protocol reduces the RAM cost of your next quickhack by 1 time(s) the number of daemons uploaded. |
This can be especially powerful when you have the other Daemons unlocked. This can help you start off a fight with a powerful Quickhack as its cost will be greatly reduced. |
Efficiency | 14 | Uploading 3 or more daemons in the same Breach Protocol increases cyberdeck RAM recovery rate by 3 unit(s) per 60 sec. Lasts 5 min. |
The regeneration is significant and will allow you to use up more Quickhacks in a shorter amount of time. The only downside is that it requires 2 other perks that will give you more Daemons for Breach Protocol. It is also required there are cameras or turrets in the network, making it less reliable. |
Mass Vulnerability: Quickhacks | 16 | Upgrades the Mass Vulnerability daemon, causing enemies in the network to also take 30% more damage from quickhacks. |
Makes mass vulnerability stronger. Quickhacks are already powerful, this will make them hit even harder. |
Totaler Recall | 16 | The ICEpick daemon reduces all quickhack costs by an additional 1 RAM unit(s). |
Also increases the effectiveness of Icepick. Making Quickhacks cheaper to use. |
Head Start | 18 | Automatically uploads the first daemon in the list at the start of Breach Protocol. |
This will ensure that Icepick or the first level of Datamine will always succeed. This will also give you less strings to put in your buffer. Downside is that because the first one is successful, you cannot quit and try again if you make a mistake. |
Hackathon | 18 | Uploading 3 or more daemons in the same Breach Protocol shortens quickhack cooldowns by 33% for 5 min. |
Significant cooldown decrease. What stops it from being S tier is that it requires at least 2 perks to work and the network has cameras or turrets |
Buffer Optimization | 20 | Increases the duration of daemon effects by 100%. |
Doubles the duration of your effects of Daemons. This can be useful for harder fights that can take longer to beat. |
Compression | 20 | Reduces the lengths of the sequences required to upload daemons by 1. Cannot be reduced below 2. |
This will make Breach protocol much easier. And makes uploading more than 1 Daemon more viable. |
Perk | Attr. Level | Effect at Lv. 1 | Rating & Reason |
---|---|---|---|
Mass Vulnerability | 3 | Unlocks the Mass Vulnerability daemon, which reduces the Physical Resistance for all enemies in the network by 30% for 3 min. |
Increases your overall DPS against every enemy with a quick Breach Protocol. |
Datamine Mastermind | 9 | Upgrades the Datamine daemon, increasing the amount of components acquired from Access Points by 50%. |
You get more components for crafting Quickhacks. If you are using a Netrunner build, getting this as soon as possible is important in order to have enough material to craft higher tier Quickhacks. |
Total Recall | 11 | The ICEpick daemon reduces all quickhack costs by an additional 1 RAM unit(s). |
This makes Icepick even stronger. Allowing you to use more Quickhacks. A must have against high level enemies. |
Cloud Cache | 14 | Completing a Breach Protocol reduces the RAM cost of your next quickhack by 1 time(s) the number of daemons uploaded. |
This can be especially powerful when you have the other Daemons unlocked. This can help you start off a fight with a powerful Quickhack as its cost will be greatly reduced. |
Mass Vulnerability: Quickhacks | 16 | Upgrades the Mass Vulnerability daemon, causing enemies in the network to also take 30% more damage from quickhacks. |
Makes mass vulnerability stronger. Quickhacks are already powerful, this will make them hit even harder. |
Totaler Recall | 16 | The ICEpick daemon reduces all quickhack costs by an additional 1 RAM unit(s). |
Also increases the effectiveness of Icepick. Making Quickhacks cheaper to use. |
Compression | 20 | Reduces the lengths of the sequences required to upload daemons by 1. Cannot be reduced below 2. |
This will make Breach protocol much easier. And makes uploading more than 1 Daemon more viable. |
List of Perks and Skill Tree Guide
All Attributes and Perk List | |||||
---|---|---|---|---|---|
Body | Reflexes | Intelligence | |||
Technical Ability | Cool |
Perk and Attribute Lists | |
---|---|
List of Perks | List of Attributes |
List of Phantom Liberty Perks | |
Character Building Guides | |
Best Builds List | Best Perks by Build |
Best Attributes | Perk Tier List by Attribute |
Breach Protocol Skill Progression and Perks | How to Level Up Breach Protocol
Genshin Impact Walkthrough & Guides Wiki
Zenless Zone Zero Walkthrough & Guides Wiki
Path of Exile 2 (PoE 2) Walkthrough & Guides Wiki
Pokemon TCG Pocket (PTCGP) Strategies & Guides Wiki
Honkai: Star Rail Walkthrough & Guides Wiki
Infinity Nikki Walkthrough & Guides Wiki
STALKER 2 Heart of Chornobyl Walkthrough & Guides Wiki
Pokemon Scarlet and Violet (SV) Walkthrough & Guides Wiki
Metaphor: ReFantazio Walkthrough & Guides Wiki
Palworld Walkthrough & Guides Wiki
Fire Emblem Heroes (FEH) Walkthrough & Guides Wiki
Once Human Walkthrough & Guides Wiki
Diablo 4: Vessel of Hatred Walkthrough & Guides Wiki
Pokemon Brilliant Diamond and Shining Pearl (BDSP) Walkthrough & Guides Wiki
Yu-Gi-Oh! Master Duel Walkthrough & Guides Wiki
Super Smash Bros. Ultimate Walkthrough & Guides Wiki
Dragon Quest Monsters: The Dark Prince Walkthrough & Guides Wiki
Cyberpunk 2077: Phantom Liberty Walkthrough & Guides Wiki
Persona 3 Reload Walkthrough & Guides Wiki
Monster Hunter World Walkthrough & Guides Wiki
CD PROJEKT®, Cyberpunk®, Cyberpunk 2077® are registered trademarks of CD PROJEKT S.A. © 2020 CD PROJEKT S.A. All rights reserved. All other copyrights and trademarks are the property of their respective owners.
The copyrights of videos of games used in our content and other intellectual property rights belong to the provider of the game.
The contents we provide on this site were created personally by members of the Game8 editorial department.
We refuse the right to reuse or repost content taken without our permission such as data or images to other sites.