ropshell> use 1aee20173ca5259f866644667ad046d8 (download)
name         : vuln (i386/ELF)
base address : 0x80490a0
total gadgets: 6653
ropshell> suggest
call
    > 0x08049c90 : call eax
    > 0x08078d0d : call ebx
    > 0x08052dd1 : call ecx
    > 0x08049cdd : call edx
    > 0x08053e57 : call esi
jmp
    > 0x080b074a : push esp; ret
    > 0x0805333b : jmp eax
    > 0x08061205 : jmp ebx
    > 0x0804f63e : jmp ecx
    > 0x08049bcc : jmp edx
load mem
    > 0x080b06b4 : mov eax, [edx + 0x4c]; ret
    > 0x0809d6ed : mov eax, [edx]; pop ebx; pop esi; ret
    > 0x0809e54f : mov edx, [eax]; mov eax, edx; ret
    > 0x08064c7d : mov edi, [esi]; jmp ebx
    > 0x080590f0 : mov eax, [ecx]; mov [edx], eax; ret
load reg
    > 0x080b073a : pop eax; ret
    > 0x0804e02e : pop ebx; ret
    > 0x08049e29 : pop ecx; ret
    > 0x0804ae6a : pop esi; ret
    > 0x0804b27f : pop edi; ret
pop pop ret
    > 0x080b073a : pop eax; ret
    > 0x0804ae69 : pop ebx; pop esi; ret
    > 0x080583b8 : pop eax; pop edx; pop ebx; ret
    > 0x080aa73a : pop eax; pop ebx; pop esi; pop edi; ret
    > 0x080567a7 : pop esp; pop ebx; pop esi; pop edi; pop ebp; ret
sp lifting
    > 0x08050989 : add esp, 0x1c; ret
    > 0x08050989 : add esp, 0x1c; ret
    > 0x080ae6c6 : add esp, 0x20; ret
stack pivoting
    > 0x0804a960 : xchg eax, esp; ret
    > 0x08049e25 : lea esp, [ecx - 4]; ret
    > 0x080a0826 : mov esp, ecx; jmp edx
    > 0x0804b4da : lea esp, [ebp - 0xc]; pop ebx; pop esi; pop edi; pop ebp; ret
    > 0x0809c2b1 : xchg esp, eax; xor esi, edi; call [eax + 0x6a]
syscall
    > 0x08071640 : int 0x80; ret
    > 0x0806e559 : call gs:[0x10]; ret
write mem
    > 0x080afb94 : add [ecx], eax; ret
    > 0x0809cbcf : add [ecx], esi; ret
    > 0x08050e8a : add [ecx], edi; ret
    > 0x080685f1 : add [eax + 0x5f028d02], ecx; ret
    > 0x08059485 : add [ebx + 0x5e5b04c4], eax; ret