PREVIEW

... , thousands, millions, billions—the amount of enemies he faced seemed endless.

Each of them was just as powerful and law-breaking as he was, and all seemed to have abilities that specifically countered his assets and aimed for his weaknesses.

Each battle was a life-and-death one that pushed him deeper and deeper into a state of empty focus.

A single mistake meant death.

But he persisted.

Every battle ended with him getting more and more injured, but he per ...

YOU MAY ALSO LIKE
The Illegitimate Flame: Bride of AshesChapter 143- I don’t want the baby
 292
4.5/5(votes)
RomanceSlice Of Life

She was the illegitimate daughter of a wealthy family—abandoned by her father, oppressed by his legal wife, and humiliated by the so-called sister. She watched her mother perish in a raging fire and was thrown into the flames herself.Her name was Janice. And she died in that fire.Ten years later, under a new identity and the name “Janet,” she survives in silence. Forced by her stepmother to marry a wealthy heir rumored to be “paralyzed and disabled,” she becomes entangled in a vicious struggle of family betrayal and ruthless power games.With cold eyes, she watches the hypocrites who once trampled her into the mud—one by one, they will become prey on her road to revenge.Her wheelchair-bound “husband” Philip, the feuding brothers Charles and August… But what she didn't expect was that the boy who once quietly handed her a handkerchief all those years ago would become the most unpredictable piece in her game of fate.She has returned—not for hatred, but to personally end the past that was once crushed beneath their feet.

Mitou Shoukan://Blood-SignVolume 10, Appendix: Summoner Name List
 97
4.5/5(votes)
ActionComedyDramaFantasy

Summoning ceremonies can freely call forth even “those which lurk in the depths beyond the gods”. One boy has top-level abilities even among the cutting-edge summoners who can use those ceremonies. He is Alice (with) Rabbit aka Shiroyama Kyousuke. But this strongest boy summoner has a single fatal weakness. Certain “cursed words” spoken by girls: “Help me.”

When Kyousuke hears those words from Meinokawa Higan, a girl brought to the verge of death, he throws himself into a city where three great summoner forces clash!

Reboot SiennaChapter 241 - Live to Sienna Pt.241
 655.8k
3.8/5(votes)
RomanceJoseiFantasyFantasy

“Marry me under the conditions that we will divorce in 5 years.”

GOD MODE FRESHMAN: Trillionaire SimulatorChapter 42 - : The Ice Queen’s Sanctuary
 30
4.5/5(votes)
FantasyComedy

Title: Trillionaire Student: The Art of Corporate WarfareGenre: Cyberpunk Corporate Drama / Tech RomanceSetting: Near-future Shanghai (2045) where blockchain dynasties and AI oligarchs dominate global finance.Protagonist:· Ye Chen: A 22-year-old financial prodigy with military-grade neural implants. Orphaned and self-made, he accidentally inherits trillion-yuan assets tied to a cryogenically preserved heiress.· Su Ning: A “frozen elite” heiress resurrected from cryostasis. Her trauma-encrypted mind holds the keys to her family's blockchain empire.Core Plot:When Ye decrypts suicidal patterns in Su's neural data, their forced partnership to upgrade her emotional firewall exposes:1. Corporate Espionage: Rival tech giants weaponize celebrity scandals as NFT commodities.2. Family Conspiracy: Su's mother audits her memories like hostile mergers.3. Hidden Protocol: A blockchain ledger tracking physical intimacy as corporate liability.Key Westernized Elements:· Boardroom duels in holographic Hunger Games-style shareholder arenas· Romance through shared neural hacking of trauma encryption· Memetic warfare where viral tweets manipulate stock marketsThemes:· Capitalism 2.0 (emotions as crypto assets, SEC-regulated marriage contracts)· Cybernetic identity (childhood trauma rebuilt as AI firewalls)· East-West fusion (Tang poetry as quantum encryption keys)Cultural Bridges:· “Black Swan Fund” → “Quantum Contingency Fund”· Neural interface battles styled as The Matrix meets Game of Thrones· Food metaphors: Xiaolongbao dumplings as encrypted data carriers