ropshell> use 51ee1a76f55f7a2d8f5fd28b856f455b (download)
name         : vuln (i386/RAW)
base address : 0x0
total gadgets: 10468
ropshell> suggest
call
    > 0x000007b0 : call eax
    > 0x00053a81 : call ebx
    > 0x00009233 : call ecx
    > 0x000007fd : call edx
    > 0x0002436d : call esi
jmp
    > 0x00060e46 : push esp; ret
    > 0x00009827 : jmp eax
    > 0x00016af0 : jmp ebx
    > 0x00005991 : jmp ecx
    > 0x00005c9f : jmp edx
load mem
    > 0x00078e46 : mov edi, [edx]; ret
    > 0x00060db0 : mov eax, [edx + 0x4c]; ret
    > 0x000541d5 : mov eax, [ecx]; pop ebx; pop esi; ret
    > 0x00047a81 : mov eax, [edx]; pop esi; pop edi; ret
    > 0x0000ee99 : mov eax, [ecx + 8]; sub eax, edx; ret
load reg
    > 0x00060e36 : pop eax; ret
    > 0x000001c9 : pop ebx; ret
    > 0x00026e6b : pop edx; ret
    > 0x00001708 : pop esi; ret
    > 0x00001adb : pop edi; ret
pop pop ret
    > 0x00060e36 : pop eax; ret
    > 0x0001389e : pop ebx; pop edi; ret
    > 0x0000e334 : pop eax; pop edx; pop ebx; ret
    > 0x0005746a : pop eax; pop ebx; pop esi; pop edi; ret
    > 0x0000c8a6 : pop esp; pop ebx; pop esi; pop edi; pop ebp; ret
sp lifting
    > 0x000070f5 : add esp, 0x1c; ret
    > 0x000070f5 : add esp, 0x1c; ret
    > 0x0005ed32 : add esp, 0x20; ret
stack pivoting
    > 0x00000f86 : xchg eax, esp; ret
    > 0x00061063 : mov esp, ecx; ret
    > 0x0000093d : lea esp, [ecx - 4]; ret
    > 0x000581e8 : lea esp, [ebp - 8]; pop ebx; pop esi; pop ebp; ret
    > 0x00036000 : lea esp, [edi + esi*8 - 1]; call [ebx - 0x7d]; ret
syscall
    > 0x000277a0 : int 0x80; ret
    > 0x000245c5 : call gs:[0x10]; ret
write mem
    > 0x00060057 : add [ecx], eax; ret
    > 0x000164a6 : add [ecx], edi; ret
    > 0x0007d11a : add [edx], ecx; ret
    > 0x00015724 : add [edi], ecx; inc ebp; ret
    > 0x0001deb1 : add [eax + 0x5f028d02], ecx; ret