PREVIEW

... ht escaped from it moments before it started to tremble. Like a headless ant, the needle rolled and twitched in several directions before letting out a mournful vibration.

“What’s wrong, Yunfei?”

Perched on top of Bai Yunfei’s shoulder, Xiao Qi stared curiously at the needle.

“Mo Ni’s soul imprint…I can’t sense it anymore!” Bai Yunfei exclaimed.

“Did he find out I was tracking him? Would he cut off his connection with his demon armament?” Bai Yunfei thought to himself. “O ...

YOU MAY ALSO LIKE
MTL - Crossing Over I Became a Married Peasant Woman~ Closing remarks
 1.3M
4.8/5(votes)
Romance

In my last life, it was difficult to have a child. In this life, I was given three radish heads as soon as I passed it, and there was an extra head. I thought my husband was a rough guy, but I didn’t expect a tough guy to have tenderness.

- Description from novelbuddy

Harem Points System: Every Touch Counts!Chapter 34: Skill Plunder!
 556
3.0/5(votes)
FantasyActionAdultAdventure

Charles or rather Xavier Dame was your average loner—broke, ignored, and invisible to the girls. But everything changes the day he awakens the [Harem Points System], a mysterious power that rewards him for physical and emotional interactions with women.From casual touches to heart-throbbing confessions, every action earns him points that can be exchanged for powerful skills, items, and stat boosts. Suddenly, he's not just charming—he's unstoppable.But things aren't that simple. The more hearts he wins, the more enemies he makes. From jealous rivals to yandere lovers and hidden organizations interested in his strange system, Ethan will need more than luck to survive his rise from zero to ultimate harem king.Can he keep his growing group of powerful beauties happy... and alive?

RE:BORN ZombieChapter 168 A NEW WORLD
 2.2k
4.1/5(votes)
FantasyAction

When a normal human suddenly dies and enters another world with the almighty cheat, their very own system, what do you think would happen?

They will rise above every other being and soar the skies, for they will become an unstoppable force that brushes through the entire world, causing waves... Or so it normally goes, right?

After Victor dies, he did get transmigrated, but it wasn't as a rich young master or some character with unfathomable potential. NO. He woke up as a random dungeon mob in another world...

Read to follow Victor's journey through his new life as a mob.

GOD MODE FRESHMAN: Trillionaire SimulatorChapter 42 - : The Ice Queen’s Sanctuary
 129
4.5/5(votes)
FantasyComedy

Title: Trillionaire Student: The Art of Corporate WarfareGenre: Cyberpunk Corporate Drama / Tech RomanceSetting: Near-future Shanghai (2045) where blockchain dynasties and AI oligarchs dominate global finance.Protagonist:· Ye Chen: A 22-year-old financial prodigy with military-grade neural implants. Orphaned and self-made, he accidentally inherits trillion-yuan assets tied to a cryogenically preserved heiress.· Su Ning: A “frozen elite” heiress resurrected from cryostasis. Her trauma-encrypted mind holds the keys to her family's blockchain empire.Core Plot:When Ye decrypts suicidal patterns in Su's neural data, their forced partnership to upgrade her emotional firewall exposes:1. Corporate Espionage: Rival tech giants weaponize celebrity scandals as NFT commodities.2. Family Conspiracy: Su's mother audits her memories like hostile mergers.3. Hidden Protocol: A blockchain ledger tracking physical intimacy as corporate liability.Key Westernized Elements:· Boardroom duels in holographic Hunger Games-style shareholder arenas· Romance through shared neural hacking of trauma encryption· Memetic warfare where viral tweets manipulate stock marketsThemes:· Capitalism 2.0 (emotions as crypto assets, SEC-regulated marriage contracts)· Cybernetic identity (childhood trauma rebuilt as AI firewalls)· East-West fusion (Tang poetry as quantum encryption keys)Cultural Bridges:· “Black Swan Fund” → “Quantum Contingency Fund”· Neural interface battles styled as The Matrix meets Game of Thrones· Food metaphors: Xiaolongbao dumplings as encrypted data carriers