Previous chapter: Chapter 3
Next chapter: Chapter 5
PREVIEW

... police weren’t looking for me to interrogate about the incident of neutralizing the villain and defeating the magical girl that happened early this morning.

From the beginning, there was no way I could be caught. There was no evidence like my face, fingerprints, or bloodstains, so how could they have identified and caught me?

Well, if they investigate my alibi, they may find it suspicious, but such an investigation couldn’t have been done in such a short time.

In other wo ...

YOU MAY ALSO LIKE
Reincarnated as the Vampire Princess' FamiliarChapter 20 - 19 - The first king
 
4.0/5(votes)
FantasyActionAdultComedy

In the vampire-ruled kingdom of Mildelar, the Blood Games stand as the ultimate form of entertainment—savage battles between familiars, humans bound to their vampire masters through blood pacts. Far more than mere spectacles, these brutal fights determine the prestige of noble families, shaping their power and influence across the realm. Lyon, a young human saved from death by a blood pact with the alluring Arya Valakys—one of the king’s daughters—is unwillingly thrust into this cruel world. Bound to his mistress, he is forced into relentless battles to elevate her standing.Lyon, however, stands apart from other familiars. While they derive their strength from the fear of punishment, he draws his... from having dirty thoughts about his mistress!

Broken Possessors of Infinite Regression AcademyChapter 135: Elder Lich, King of the Undead – 3
 155
4.0/5(votes)
ActionAdventureComedyEcchi

I was transmigrated into a work I liked and finally came back.But after, I was dragged into an Academy Romance Novel, which I skipped over after only reading the prologue.There I found a half-broken possessors who regressed endlessly.

May the rest of my life be sweet to youChapter 2305
 1.8k
3.5/5(votes)
RomanceJosei

“Uncle, I was punished for being late! ” “Buy the school. ”

“Uncle, I was bullied! ” “SEND THEM TO HEAVEN! ”

In this era of competing for fathers, Qin Sheng never competed for fathers. Those things were too extravagant. She didn’t have them, she only competed for uncles!

Ever since she had a rich uncle, she lived a life of fighting and being cleaned up by others, causing trouble and being scapegoated by others.

Her three big goals in life were to make him fall in love with her, fall in love with her, fall in love with her!

GOD MODE FRESHMAN: Trillionaire SimulatorChapter 42 - : The Ice Queen’s Sanctuary
 2
4.5/5(votes)
FantasyComedy

Title: Trillionaire Student: The Art of Corporate WarfareGenre: Cyberpunk Corporate Drama / Tech RomanceSetting: Near-future Shanghai (2045) where blockchain dynasties and AI oligarchs dominate global finance.Protagonist:· Ye Chen: A 22-year-old financial prodigy with military-grade neural implants. Orphaned and self-made, he accidentally inherits trillion-yuan assets tied to a cryogenically preserved heiress.· Su Ning: A “frozen elite” heiress resurrected from cryostasis. Her trauma-encrypted mind holds the keys to her family's blockchain empire.Core Plot:When Ye decrypts suicidal patterns in Su's neural data, their forced partnership to upgrade her emotional firewall exposes:1. Corporate Espionage: Rival tech giants weaponize celebrity scandals as NFT commodities.2. Family Conspiracy: Su's mother audits her memories like hostile mergers.3. Hidden Protocol: A blockchain ledger tracking physical intimacy as corporate liability.Key Westernized Elements:· Boardroom duels in holographic Hunger Games-style shareholder arenas· Romance through shared neural hacking of trauma encryption· Memetic warfare where viral tweets manipulate stock marketsThemes:· Capitalism 2.0 (emotions as crypto assets, SEC-regulated marriage contracts)· Cybernetic identity (childhood trauma rebuilt as AI firewalls)· East-West fusion (Tang poetry as quantum encryption keys)Cultural Bridges:· “Black Swan Fund” → “Quantum Contingency Fund”· Neural interface battles styled as The Matrix meets Game of Thrones· Food metaphors: Xiaolongbao dumplings as encrypted data carriers