ropshell> use 09b4f7d234859cf6dd55bd4a4275d152 (download)
name         : binex_vuln_custom (x86_64/ELF)
base address : 0x6050
total gadgets: 4134
ropshell> suggest
call
    > 0x0001e34e : call rax
    > 0x000182df : call rbx
    > 0x0001e696 : call rcx
    > 0x00015126 : call rsi
    > 0x00008cf1 : call rdi
jmp
    > 0x00007b2f : jmp rax
    > 0x000159fe : jmp rbx
    > 0x0000817a : jmp rcx
    > 0x0000c4c8 : jmp rdx
    > 0x0000f34a : jmp rsi
load mem
    > 0x000385c0 : mov rax, [rdi + 0x10]; ret
    > 0x00036b04 : mov rdx, [rdi + 0x28]; ret
    > 0x000385c1 : mov eax, [rdi + 0x10]; ret
    > 0x00036b05 : mov edx, [rdi + 0x28]; ret
    > 0x000385b0 : mov rax, [rdi]; mov rdx, [rdi + 8]; ret
load reg
    > 0x00008cf3 : pop rax; ret
    > 0x0000707e : pop rbx; ret
    > 0x00006860 : pop rcx; ret
    > 0x000060d5 : pop rsi; ret
    > 0x000061a1 : pop rdi; ret
pop pop ret
    > 0x000060d4 : pop r14; ret
    > 0x0000619e : pop r14; pop r15; ret
    > 0x00006375 : pop r12; pop r14; pop r15; ret
    > 0x000092c2 : pop r12; pop r13; pop r14; pop r15; ret
    > 0x000066b4 : pop r12; pop r13; pop r14; pop r15; pop rbp; ret
sp lifting
    > 0x00006e2d : add rsp, 0x18; ret
    > 0x00006e2d : add rsp, 0x18; ret
    > 0x000067e1 : add rsp, 0x28; ret
    > 0x00013a8d : add rsp, 0x30; ret
    > 0x000087e7 : add rsp, 0x48; ret
stack pivoting
    > 0x0002779e : xchg eax, esp; ret
    > 0x0003378c : lea esp, [rdi + 8]; movzx edx, dl; lea rbx, [rip + 0xcfd3]; movsxd rdx, [rbx + rdx*4]; add rdx, rbx; jmp rdx
    > 0x0003ca6c : leave ; ret
write mem
    > 0x00030abb : adc [rdi], eax; ret
    > 0x00039163 : add [r8], rax; pop rcx; ret
    > 0x0002c757 : add [rax + 0xf], ecx; ret
    > 0x00030c65 : add [rdi + 0x18], rsi; ret
    > 0x00030c66 : add [rdi + 0x18], esi; ret