ropshell> use 0903490aa687f48220bcabd0f0e0285b (download)
name         : binex_vuln_custom (x86_64/ELF)
base address : 0x6050
total gadgets: 4203
ropshell> suggest
call
    > 0x0001cb4e : call rax
    > 0x000179ff : call rbx
    > 0x0001d5d6 : call rcx
    > 0x00014a36 : call rsi
    > 0x00008271 : call rdi
jmp
    > 0x00007aaf : jmp rax
    > 0x0001530e : jmp rbx
    > 0x00010fa4 : jmp rcx
    > 0x0000c2ea : jmp rdx
    > 0x0000f166 : jmp rsi
load mem
    > 0x00036cb0 : mov rax, [rdi + 0x10]; ret
    > 0x00035244 : mov rdx, [rdi + 0x28]; ret
    > 0x00036cb1 : mov eax, [rdi + 0x10]; ret
    > 0x00035245 : mov edx, [rdi + 0x28]; ret
    > 0x00009330 : mov rax, [rdi]; add [rax + 8], 1; ret
load reg
    > 0x00008273 : pop rax; ret
    > 0x0000707e : pop rbx; ret
    > 0x00006870 : pop rcx; ret
    > 0x00006195 : pop rsi; ret
    > 0x000060ed : pop rdi; ret
pop pop ret
    > 0x00006194 : pop r14; ret
    > 0x000060ea : pop r14; pop r15; ret
    > 0x000093d0 : pop r12; pop r14; pop r15; ret
    > 0x00008a02 : pop r12; pop r13; pop r14; pop r15; ret
    > 0x000063d9 : pop r12; pop r13; pop r14; pop r15; pop rbp; ret
sp lifting
    > 0x00006e2d : add rsp, 0x18; ret
    > 0x00006e2d : add rsp, 0x18; ret
    > 0x00021ce9 : add rsp, 0x28; ret
    > 0x0001339d : add rsp, 0x30; ret
    > 0x0001d03a : add rsp, 0x48; ret
stack pivoting
    > 0x0002aee5 : xchg eax, esp; ret
    > 0x0001def2 : mov esp, edx; mov rdi, [rdx]; mov rax, [rdx + 8]; call [rax]
    > 0x0002e912 : mov esp, eax; sub r12, rcx; lea rdx, [r12*8]; mov r14, [rip + 0x1e532]; mov [rsp + 8], r8; call r14
    > 0x00031ecc : lea esp, [rdi + 8]; movzx edx, dl; lea rbx, [rip + 0xd7b3]; movsxd rdx, [rbx + rdx*4]; add rdx, rbx; jmp rdx
    > 0x0003b03e : leave ; ret
write mem
    > 0x00008783 : adc [rcx], eax; ret
    > 0x0002f1fb : adc [rdi], eax; ret
    > 0x0002e318 : add [rax + 0x6b], ecx; ret
    > 0x0002f3a5 : add [rdi + 0x18], rsi; ret
    > 0x0002f3a6 : add [rdi + 0x18], esi; ret