ropshell> use 4e38150e304446a25fa46443144af0dc (download)
name         : ch73.exe (i386/PE)
base address : 0x401000
total gadgets: 228
ropshell> suggest
call
    > 0x00401274 : call eax
    > 0x00401549 : call edx
    > 0x004020a6 : call esi
    > 0x00401204 : call edi
    > 0x00402365 : call ebp
jmp
    > 0x0040220a : jmp eax
    > 0x00402a73 : jmp [eax + 0x2a]
    > 0x0040112d : jmp [esi - 0x70]
load mem
    > 0x00402743 : movzx edx, [eax + 0x400006]; mov eax, edx; ret
    > 0x00402360 : mov eax, [ebx]; mov [esp], eax; call ebp
    > 0x00402376 : mov eax, [ebx + 4]; mov [esp], esi; call eax
load reg
    > 0x0040194d : pop ebx; ret
    > 0x00402948 : pop ecx; ret
    > 0x004023b6 : pop esi; ret
    > 0x00401eb1 : pop edi; ret
    > 0x00401410 : pop ebp; ret
pop pop ret
    > 0x00401410 : pop ebp; ret
    > 0x00402947 : pop eax; pop ecx; ret
    > 0x00401eaf : pop ebx; pop esi; pop edi; ret
    > 0x0040140d : pop ebx; pop esi; pop edi; pop ebp; ret
sp lifting
    > 0x00401095 : add esp, 0x1c; ret
    > 0x00401095 : add esp, 0x1c; ret
    > 0x0040116a : add esp, 0x2c; ret
    > 0x00401cb7 : add esp, 0x3c; ret
    > 0x0040199b : sub esp, 0xc; nop ; call eax
stack pivoting
    > 0x0040140a : lea esp, [ebp - 0xc]; pop ebx; pop esi; pop edi; pop ebp; ret
    > 0x00401944 : xchg eax, esp; adc [eax], al; add [ebx - 0x2776d73c], al; pop ebx; ret
    > 0x00401557 : leave ; ret
write mem
    > 0x00401eab : add [ebx + 0x5e5b30c4], eax; pop edi; ret