ropshell> use 51ee1a76f55f7a2d8f5fd28b856f455b (download)
name         : vuln (i386/ELF)
base address : 0x8048240
total gadgets: 6851
ropshell> suggest "load mem"
> 0x080a8db0 : mov eax, [edx + 0x4c]; ret
> 0x0809c1d5 : mov eax, [ecx]; pop ebx; pop esi; ret
> 0x0808fa81 : mov eax, [edx]; pop esi; pop edi; ret
> 0x08056e99 : mov eax, [ecx + 8]; sub eax, edx; ret
> 0x080a643b : mov ebp, [ecx + eax]; add [ebp - 0x7e0b8a37], al; ret
> 0x08060a60 : movzx ecx, [eax]; movzx eax, [edx]; sub eax, ecx; ret
> 0x080559d8 : mov eax, [esi + 0xc]; pop esi; pop edi; jmp eax
> 0x08060ca9 : movzx ecx, [esi + ecx]; sub eax, ecx; pop esi; pop edi; ret
> 0x08099906 : mov eax, [esi]; add eax, [edi]; call eax
> 0x0809a5f1 : mov eax, [edi]; add eax, [ecx]; call eax
> 0x0809da22 : mov eax, [ebx + 0x14]; call [ebx]
> 0x080541a8 : mov eax, [edi + 0x10]; pop ebx; pop esi; pop edi; jmp eax
> 0x0809d02e : mov edx, [eax]; mov eax, [esp + 8]; mov [eax], edx; ret
> 0x08060a70 : movzx ecx, [eax + 1]; movzx eax, [edx + 1]; sub eax, ecx; ret
> 0x0808feae : mov ecx, [edx + 0x24]; cmp ecx, [edx + 0x28]; cmove eax, ecx; ret
> 0x080a1912 : mov edx, [ecx + 0x1b68]; add [edx + eax*2], 1; pop ebx; pop esi; ret
> 0x080a1350 : mov edx, [esi + 0xc]; mov [edx], eax; add esp, 4; pop ebx; pop esi; ret
> 0x0809efb6 : mov ebp, [eax + 0xc]; mov eax, [esp + 8]; mov esp, ecx; jmp edx
> 0x0809da1f : mov ecx, [ebx + 0x10]; mov eax, [ebx + 0x14]; call [ebx]
> 0x08099903 : mov edi, [ebp + 8]; mov eax, [esi]; add eax, [edi]; call eax
> 0x08051228 : mov eax, [ebp + 0x20]; sub eax, edx; sub esp, 4; push eax; push edx; push ebp; call ecx
> 0x0809a328 : mov edx, [ebp + 8]; mov eax, [esi + 8]; add eax, [edx]; call eax
> 0x0809a5eb : mov ecx, [ebp + 8]; add esi, 8; mov eax, [edi]; add eax, [ecx]; call eax
> 0x08055849 : mov edx, [eax + 0x24]; mov [eax + 0x24], ecx; mov [eax + 0xc], edx; mov [eax + 4], edx; ret
> 0x0809efb3 : mov edi, [eax + 8]; mov ebp, [eax + 0xc]; mov eax, [esp + 8]; mov esp, ecx; jmp edx
> 0x08093a87 : mov ebx, [edx + 0x10]; and ebx, eax; lea edx, [edx + ebx*4]; add eax, [edx + ecx]; pop ebx; pop esi; ret
> 0x0809da1c : mov edx, [ebx + 0xc]; mov ecx, [ebx + 0x10]; mov eax, [ebx + 0x14]; call [ebx]
> 0x080509a0 : mov edx, [edi + 8]; mov [ebp - 0x44], eax; sub eax, edx; push eax; push edx; push edi; call [ebx + 0x38]
> 0x0805067b : mov edi, [ebx + 0x54]; mov eax, gs:[0x14]; mov [esp + 0x18], eax; xor eax, eax; push edi; call [edi + 0x10]
> 0x0809d026 : mov ecx, [edx]; mov edx, [esp + 4]; mov [edx], ecx; mov edx, [eax]; mov eax, [esp + 8]; mov [eax], edx; ret
> 0x0809efb0 : mov esi, [eax + 4]; mov edi, [eax + 8]; mov ebp, [eax + 0xc]; mov eax, [esp + 8]; mov esp, ecx; jmp edx
> 0x0809efae : mov ebx, [eax]; mov esi, [eax + 4]; mov edi, [eax + 8]; mov ebp, [eax + 0xc]; mov eax, [esp + 8]; mov esp, ecx; jmp edx
> 0x0809da15 : mov esi, [ebx]; mov edi, [ebx + 4]; mov [ebx], eax; mov edx, [ebx + 0xc]; mov ecx, [ebx + 0x10]; mov eax, [ebx + 0x14]; call [ebx]