The Third Hokage's words made it impossible for Hiroki Sawada to rest easy in the hospital.
Danzo.
That name immediately surfaced in his mind.
The "certain people" the Sandaime mentioned could only mean that old relic from Root — the eternal scapegoat of Konoha. Only Danzo Shimura had both the nerve and the authority to oppose the Hokage's judgment.
When the Third said "Don't let certain people down too much," he was clearly talking about him.
And the part about showing something "less dangerous"?
That was obviously referring to Hiroki's bloodline limit — his mysterious "golden finger."
It was a power he needed to use… but also one he had to hide.
He had to prove his worth through his own skill — talent that wasn't just handed down through genetics or mutation.
Because if his entire value came from his bloodline, even the Hokage's protection might not last forever. And in the worst case… he could end up as one of Orochimaru's experimental projects.
No, the Hokage wouldn't go that far.
But it was clear — if he didn't show potential beyond his special ability, the village would hold back its resources and keep him at arm's length.
Damn it, Third Hokage… you really know how to make things complicated.
It was a perfect Catch-22 — a problem balanced on a knife's edge.
So how could he break free?
He needed to create a skill that looked impressive but wasn't too threatening. Something that displayed potential, but came with enough restrictions that the higher-ups wouldn't see it as a danger.
After thinking for a while, Hiroki's eyes suddenly lit up.
As a programmer, what do you do when you want to create an attack program?
Simple — you find a vulnerability.
You exploit it.
You write a Denial-of-Service attack.
The thought hit him like a flash of lightning.
That's it!
He could create a mental script — a psychic "program" that attacks an opponent's mind directly.
He remembered something from earlier: when he was scanning those strange "Wi-Fi signals" in the hospital, he'd noticed a vulnerability. When someone had mental defenses up, their temporary cache — the area that held fleeting thoughts — wasn't properly protected.
Perfect.
He could build a script that, once connected to someone, would endlessly copy and paste every thought that appeared in their temporary cache — flooding it until the person's mind overloaded.
For example, if the target thought:
"What am I thinking?"
The script would replicate it into:
"What am I thinking? What am I thinking?"
Then again:
"What am I thinking? What am I thinking? What am I thinking? What am I thinking?"
In seconds, their brain would be packed with useless, looping thoughts.
They'd be unable to form hand seals, move properly, or even stand straight — trapped in a mental feedback loop.
A mind-based denial-of-service attack.
It was perfect in every way.
Strong enough to impress the Hokage.
Safe enough not to terrify the council.
And limited enough that it looked "controlled" — it required a connection to work.
Which meant, as long as he played it smart, people would think it was a niche, situational power.
He'd look "talented but harmless."
Exactly what he needed.
With renewed determination, Hiroki sat up in bed, closed his eyes, and focused.
His consciousness sank into that familiar dark-blue mental space — his inner "desktop."
His thoughts transformed into a mouse cursor.
Right-click → New → Text Document.txt
A blank file appeared. He renamed it:
Brain_Overload_Script.bat
Double-click.
The file opened, and his thoughts began to flow into lines of code.
[Brain_Overload_Script.bat]
-----------------------------------------------
@echo off
:: Enable delayed variable expansion
setlocal enabledelayedexpansion
:: If no mental connection is established, exit
if not defined TargetName (
exit /b
)
set TargetPath=C:\Users\%TargetName%\AppData\Local\Temp
if not exist "%TargetPath%" (
exit /b
)
set AttackStrength=10
:: Number of times each original thought will be duplicated
set OverloadThreshold=10000
:: Stop attack when junk thoughts exceed this number
:AttackLoop
:: Step 1: Scan all current thought cache files
for %%F in ("%TargetPath%\*.tmp") do (
:: Step 2: Copy and amplify each thought file
for /l %%i in (1,1,!AttackStrength!) do (
set /a RandomNum=!random!
copy "%TargetPath%\%%~nxF" "%TargetPath%\%%~nF_copy_!RandomNum!.tmp" >nul
)
)
:: Step 3: Check if overload threshold reached
set /a TotalFiles=0
for %%F in ("%TargetPath%\*.tmp") do (
set /a TotalFiles+=1
)
if !TotalFiles! geq !OverloadThreshold! (
goto AttackComplete
)
timeout /t 0 >nul
goto AttackLoop
:AttackComplete
exit
----------------------------------------------
After finishing the code, Hiroki saved the file with a .bat extension — ready for activation.
He exhaled slowly, satisfaction flickering in his eyes.
Now all that was left…
was to find a test subject.
Time to see if his mental DoS attack could really crash a human brain.
