ropshell> use 0903490aa687f48220bcabd0f0e0285b (download)
name         : binex_vuln_custom (x86_64/ELF)
base address : 0x6050
total gadgets: 4203
ropshell> suggest "load reg"
> 0x00008273 : pop rax; ret
> 0x0000707e : pop rbx; ret
> 0x00006870 : pop rcx; ret
> 0x00006195 : pop rsi; ret
> 0x000060ed : pop rdi; ret
> 0x000063e1 : pop rbp; ret
> 0x00006194 : pop r14; ret
> 0x000060ec : pop r15; ret
> 0x000093d1 : pop rsp; pop r14; pop r15; ret
> 0x000093d0 : pop r12; pop r14; pop r15; ret
> 0x00008a04 : pop r13; pop r14; pop r15; ret
> 0x0001d61e : mov rax, [rsp]; pop rcx; ret
> 0x0001d61f : mov eax, [rsp]; pop rcx; ret
> 0x0002a2b7 : mov rdx, [rsp + 0x30]; call rbx
> 0x00030464 : mov rsi, [rsp + 0x30]; call rbp
> 0x0002e960 : mov r12, [rsp + 0x10]; call r8
> 0x0002a2b8 : mov edx, [rsp + 0x30]; call rbx
> 0x00030465 : mov esi, [rsp + 0x30]; call rbp
> 0x0002e961 : mov esp, [rsp + 0x10]; call r8
> 0x0002dd65 : mov rcx, [rsp + 0x10]; mov [rdi + 0x28], rcx; add rsp, 0x18; ret
> 0x0002dd66 : mov ecx, [rsp + 0x10]; mov [rdi + 0x28], rcx; add rsp, 0x18; ret
> 0x000095cc : mov edi, [rsp + rbx + 0x10]; mov edx, 8; call r13
> 0x00015519 : mov rbx, [rsp + 8]; mov rdi, r15; mov rsi, rbx; call r13
> 0x0001551a : mov ebx, [rsp + 8]; mov rdi, r15; mov rsi, rbx; call r13
> 0x0003024b : pop rdx; add [rax], eax; add [rcx - 0xf7db84], al; call [rax]
> 0x0000666d : mov rdi, [rsp + 0x48]; mov rax, [rsp + 0x50]; call [rax + 0x20]
> 0x0001b98c : mov r15, [rsp + 0x30]; call [rip + 0x31529]; mov rdi, r12; call [r15 + 0x28]
> 0x0002a2ad : mov rbp, [rsp + 0x38]; mov rdi, rbp; xor esi, esi; mov rdx, [rsp + 0x30]; call rbx
> 0x0002a2ae : mov ebp, [rsp + 0x38]; mov rdi, rbp; xor esi, esi; mov rdx, [rsp + 0x30]; call rbx
> 0x0002063e : mov r13, [rsp]; mov rbx, [rsp + 8]; mov rdi, r12; mov rsi, r13; mov rdx, rbx; call r14
> 0x00022ef3 : mov r14, [rsp + 0x20]; mov rdi, [r14]; mov rax, [r14 + 8]; call [rax]