ropshell> use 268d91e97f93f943c6adc61e29e491ca (download)
name         : vuln (x86_64/ELF)
base address : 0x401160
total gadgets: 962
ropshell> suggest
call
    > 0x00406c78 : call rax
    > 0x0040791e : call rbx
    > 0x00406df3 : call rcx
    > 0x004086a5 : call rsi
    > 0x004078dc : call rdi
jmp
    > 0x004119ca : push rsp; ret
    > 0x004011dc : jmp rax
    > 0x00412b3d : jmp rsp
    > 0x0040e0b2 : jmp [rcx]
    > 0x004012e5 : jmp [rsi + 0x2e]
load mem
    > 0x0041297e : mov eax, [rdi + 0x40]; ret
    > 0x00406c74 : mov rdi, [rbx + 0x50]; call rax
    > 0x00411930 : mov edx, [rbx + 0x88]; pop rbx; sub rax, rdx; ret
    > 0x00406c75 : mov edi, [rbx + 0x50]; call rax
    > 0x004074e4 : mov rdi, [rbp + 0x50]; call [rbp + 0x40]
load reg
    > 0x0040a8ee : pop rax; ret
    > 0x00408e3b : pop rbx; ret
    > 0x00403f62 : pop rdx; ret
    > 0x00404cc0 : pop rsi; ret
    > 0x00401465 : pop rdi; ret
pop pop ret
    > 0x0040726d : pop r12; ret
    > 0x0040a178 : pop r12; pop r13; ret
    > 0x00404cbb : pop r12; pop r13; pop r14; ret
    > 0x00401937 : pop r12; pop r13; pop r14; pop r15; ret
    > 0x00401936 : pop rbp; pop r12; pop r13; pop r14; pop r15; ret
sp lifting
    > 0x00411003 : add rsp, 0x18; ret
    > 0x00411003 : add rsp, 0x18; ret
stack pivoting
    > 0x0040d671 : push rdx; pop rsp; add rax, rdx; ret
    > 0x00406dec : mov esp, edx; mov edx, 0x1740; call rcx
    > 0x00410c68 : xchg eax, esp; mov al, 0; add [rcx], ch; clc ; cdqe ; mov rax, [rdx + rax*8]; ret
    > 0x00404c41 : leave ; mov eax, ecx; ret
write mem
    > 0x0040ff64 : adc [rdi + 0x1718], eax; ret
    > 0x0040748e : adc [rbp + 0x60], esi; call rcx
    > 0x0040fd93 : add [rax + 0x63], ecx; jmp [rsi + 0xf]
    > 0x0041009c : add [rbx + 0x28], rbp; add rsp, 8; pop rbx; pop rbp; ret
    > 0x0041009d : add [rbx + 0x28], ebp; add rsp, 8; pop rbx; pop rbp; ret