ropshell> use 266517f836b39b60c49844d388337f81 (download)
name         : vuln (i386/RAW)
base address : 0x0
total gadgets: 493
ropshell> suggest
call
    > 0x000049ac : call edi
    > 0x00001511 : call esp
    > 0x000014d6 : call [ebx]
    > 0x0000aee8 : call [ecx]
    > 0x0000967e : call [edx]
jmp
    > 0x000010be : jmp eax
    > 0x00001749 : jmp edx
    > 0x00003174 : jmp esi
    > 0x0000a295 : jmp [eax + eax]
    > 0x000051cb : jmp [edx - 0x1c]
load mem
    > 0x00001784 : mov eax, [ecx]; dec eax; mov [edi], eax; ret
    > 0x00004aaa : mov eax, [ebx + 0x50]; mov edx, 1; pop ebx; jmp eax
load reg
    > 0x00001001 : pop eax; ret
    > 0x00003e72 : pop ebx; ret
    > 0x0000c909 : pop edx; ret
    > 0x00004653 : pop esi; ret
    > 0x00002bca : pop edi; ret
pop pop ret
    > 0x00001001 : pop eax; ret
    > 0x000014e5 : pop ebx; pop ebp; ret
sp lifting
    > 0x000014b4 : add esp, 0x158; ret
    > 0x000014b4 : add esp, 0x158; ret
    > 0x00004241 : add esp, 0x28; ret
stack pivoting
    > 0x00001273 : leave ; ret
write mem
    > 0x0001aa29 : add [ebx], eax; ret
    > 0x00019d5a : add [ecx], eax; ret
    > 0x000045a8 : adc [edi + 0x20], eax; ret
    > 0x0000c904 : add [ebp + 0x5a00000f], esi; ret
    > 0x000042e4 : adc [eax + 1], edi; pop ebx; ret