What you can do as a member?

Get free access to these features:.
- Save your data on maps and other tools
- Site theme change
- Game bookmarking feature
- Provide feedback on the website
★ 2.1 Update and Ultimate Edition are now available!
┗ NEW: Metro System, Car Racing, Romantic Hangouts
★ Phantom Liberty: Dogtown Map & Relics System
★ See our Best Update 2.0 Builds here!
┗ HOT: Blades Build, Netrunner Build, & Assassin Build
★ Update 2.0: Changes to Perks, Cyberware, & UI
This is a guide to the Breach Protocol Skill Tree in Cyberpunk 2077. Learn how to level up the Skill Progression for this Skill Tree, all Perks available, and how to unlock all its Perks.
List of Contents
Successfully Breach computers and access points.
1 | 2 | 3 | 4 |
---|---|---|---|
- | +1 Perk Point(s) | Increases Breach Protocol Time by 5%. | Increases Components Acquired by 10%. |
5 | 6 | 7 | 8 |
Increases Breach Protocol Time by 5%. | +1 Perk Point(s) | Increases Breach Protocol Time by 5%. | Increases RAM by 1. |
9 | 10 | 11 | 12 |
Increases Components Acquired by 10%. | +1 Perk Point(s) | Increases Breach Protocol Time by 5%. | Increases Components Acquired by 10%. |
13 | 14 | 15 | 16 |
Increases RAM by 1. | +1 Perk Point(s) | Increases Breach Protocol Time by 5%. | +1 Perk Point(s) |
17 | 18 | 19 | 20 |
Increases Components Acquired by 10%. | +1 Perk Point(s) | Increases Buffer Extension by 1. | Unlocks the last Perk in the Skill tree. |
Perk | Attr. Level | Effect at Lv. 1 | Rating & Reason |
---|---|---|---|
![]() |
Level 16 in Breach Protocol | Increases the breach time of Breach Protocol by 50%. |
![]() Longer Breach Protocol time is not necessary to successfully Breach Protocol. |
![]() |
3 | Unlocks the Big Sleep daemon, which disables all cameras in the network for 3 min. |
![]() Not having to worry about cameras for awhile without having to spend RAM and hacking each one individually is convenient and efficient. Mandatory if you wish to use Hackathon and Efficiency. |
![]() |
3 | Unlocks the Mass Vulnerability daemon, which reduces the Physical Resistance for all enemies in the network by 30% for 3 min. |
![]() Increases your overall DPS against every enemy with a quick Breach Protocol. |
![]() |
5 | Increases the breach time for Breach Protocol by 20%. |
![]() The increased time for Breach Protocol is not very useful as you should be planning ahead before starting on the hack. Making the need for more time redundant. Can help you when you make a mistake or when there are many Daemons you can upload. |
![]() |
5 | Upgrades the Datamine daemon, increasing the amount of eurodollars acquired from Access Points by 50%. |
![]() More eddies to spend is always welcome. |
![]() |
7 | Upgrades the Mass Vulnerability daemon, reducing all Resistances for enemies in the network by 30%. |
![]() Decreases all resistances making Mass Vulnerability help you deal even more damage. |
![]() |
7 | Automatically highlights nearby Access Points. |
![]() Access points already show up when you are near them, having them highlighted is just redundant. |
![]() |
9 | Upgrades the Datamine daemon, increasing the amount of components acquired from Access Points by 50%. |
![]() You get more components for crafting Quickhacks. If you are using a Netrunner build, getting this as soon as possible is important in order to have enough material to craft higher tier Quickhacks. |
![]() |
9 | Unlocks the Turret Shutdown daemon, which disables security turrets in the network for 3 min. |
![]() A weaker version of Turret Tamer. Can still be used to activate Efficiency and Hackathon perks. |
![]() |
11 | The ICEpick daemon reduces all quickhack costs by an additional 1 RAM unit(s). |
![]() This makes Icepick even stronger. Allowing you to use more Quickhacks. A must have against high level enemies. |
![]() |
12 | Unlocks the Turret Tamer daemon, which sets the status of every turret in the network to friendly for 3 min. |
![]() Very powerful if there are turrets in the network. Can help proc Hackathon and Efficiency. |
![]() |
12 | Upgrades the Datamine daemon, increasing the chance to acquire a quickhack from Access Points by 50%. |
![]() Even with the increased 100% chance, the odds of getting a Quickhack is low. There is a chance of getting Epic Quickhacks, but that requires a lot of Datamining and some luck. |
![]() |
14 | Completing a Breach Protocol reduces the RAM cost of your next quickhack by 1 time(s) the number of daemons uploaded. |
![]() This can be especially powerful when you have the other Daemons unlocked. This can help you start off a fight with a powerful Quickhack as its cost will be greatly reduced. |
![]() |
14 | Uploading 3 or more daemons in the same Breach Protocol increases cyberdeck RAM recovery rate by 3 unit(s) per 60 sec. Lasts 5 min. |
![]() The regeneration is significant and will allow you to use up more Quickhacks in a shorter amount of time. The only downside is that it requires 2 other perks that will give you more Daemons for Breach Protocol. It is also required there are cameras or turrets in the network, making it less reliable. |
![]() |
16 | Upgrades the Mass Vulnerability daemon, causing enemies in the network to also take 30% more damage from quickhacks. |
![]() Makes mass vulnerability stronger. Quickhacks are already powerful, this will make them hit even harder. |
![]() |
16 | The ICEpick daemon reduces all quickhack costs by an additional 1 RAM unit(s). |
![]() Also increases the effectiveness of Icepick. Making Quickhacks cheaper to use. |
![]() |
18 | Automatically uploads the first daemon in the list at the start of Breach Protocol. |
![]() This will ensure that Icepick or the first level of Datamine will always succeed. This will also give you less strings to put in your buffer. Downside is that because the first one is successful, you cannot quit and try again if you make a mistake. |
![]() |
18 | Uploading 3 or more daemons in the same Breach Protocol shortens quickhack cooldowns by 33% for 5 min. |
![]() Significant cooldown decrease. What stops it from being S tier is that it requires at least 2 perks to work and the network has cameras or turrets |
![]() |
20 | Increases the duration of daemon effects by 100%. |
![]() Doubles the duration of your effects of Daemons. This can be useful for harder fights that can take longer to beat. |
![]() |
20 | Reduces the lengths of the sequences required to upload daemons by 1. Cannot be reduced below 2. |
![]() This will make Breach protocol much easier. And makes uploading more than 1 Daemon more viable. |
Perk | Attr. Level | Effect at Lv. 1 | Rating & Reason |
---|---|---|---|
![]() |
3 | Unlocks the Mass Vulnerability daemon, which reduces the Physical Resistance for all enemies in the network by 30% for 3 min. |
![]() Increases your overall DPS against every enemy with a quick Breach Protocol. |
![]() |
9 | Upgrades the Datamine daemon, increasing the amount of components acquired from Access Points by 50%. |
![]() You get more components for crafting Quickhacks. If you are using a Netrunner build, getting this as soon as possible is important in order to have enough material to craft higher tier Quickhacks. |
![]() |
11 | The ICEpick daemon reduces all quickhack costs by an additional 1 RAM unit(s). |
![]() This makes Icepick even stronger. Allowing you to use more Quickhacks. A must have against high level enemies. |
![]() |
14 | Completing a Breach Protocol reduces the RAM cost of your next quickhack by 1 time(s) the number of daemons uploaded. |
![]() This can be especially powerful when you have the other Daemons unlocked. This can help you start off a fight with a powerful Quickhack as its cost will be greatly reduced. |
![]() |
16 | Upgrades the Mass Vulnerability daemon, causing enemies in the network to also take 30% more damage from quickhacks. |
![]() Makes mass vulnerability stronger. Quickhacks are already powerful, this will make them hit even harder. |
![]() |
16 | The ICEpick daemon reduces all quickhack costs by an additional 1 RAM unit(s). |
![]() Also increases the effectiveness of Icepick. Making Quickhacks cheaper to use. |
![]() |
20 | Reduces the lengths of the sequences required to upload daemons by 1. Cannot be reduced below 2. |
![]() This will make Breach protocol much easier. And makes uploading more than 1 Daemon more viable. |
List of Perks and Skill Tree Guide
All Attributes and Perk List | |||||
---|---|---|---|---|---|
Body | Reflexes | Intelligence | |||
Technical Ability | Cool |
Perk and Attribute Lists | |
---|---|
List of Perks | List of Attributes |
List of Phantom Liberty Perks | |
Character Building Guides | |
Best Builds List | Best Perks by Build |
Best Attributes | Perk Tier List by Attribute |
Breach Protocol Skill Progression and Perks | How to Level Up Breach Protocol
Monster Hunter Wilds Walkthrough & Guides Wiki
Genshin Impact Walkthrough & Guides Wiki
Pokemon TCG Pocket (PTCGP) Strategies & Guides Wiki
Honkai: Star Rail Walkthrough & Guides Wiki
Wuthering Waves Walkthrough & Guides Wiki
Pokemon Scarlet and Violet (SV) Walkthrough & Guides Wiki
Avowed Walkthrough & Guides Wiki
Zenless Zone Zero Walkthrough & Guides Wiki
Palworld Walkthrough & Guides Wiki
Monster Hunter Rise: Sunbreak Walkthrough & Guides Wiki
Fire Emblem Heroes (FEH) Walkthrough & Guides Wiki
Once Human Walkthrough & Guides Wiki
Super Smash Bros. Ultimate Walkthrough & Guides Wiki
Monster Hunter World Walkthrough & Guides Wiki
Black Myth: Wukong Walkthrough & Guides Wiki
Persona 3 Reload Walkthrough & Guides Wiki
Pokemon Brilliant Diamond and Shining Pearl (BDSP) Walkthrough & Guides Wiki
Yu-Gi-Oh! Master Duel Walkthrough & Guides Wiki
Diablo 4: Vessel of Hatred Walkthrough & Guides Wiki
Elden Ring Shadow of the Erdtree Walkthrough & Guides Wiki
CD PROJEKT®, Cyberpunk®, Cyberpunk 2077® are registered trademarks of CD PROJEKT S.A. © 2020 CD PROJEKT S.A. All rights reserved. All other copyrights and trademarks are the property of their respective owners.
The copyrights of videos of games used in our content and other intellectual property rights belong to the provider of the game.
The contents we provide on this site were created personally by members of the Game8 editorial department.
We refuse the right to reuse or repost content taken without our permission such as data or images to other sites.