ropshell> use 622e691e1c37ffbcf0a3317f15c202f6 (download) name : A..Mazing.exe (x86_64/PE) base address : 0x140001000 total gadgets: 326
ropshell> suggest call > 0x140006a0b : call [rax + 0x20c48348]; pop rbp; ret jmp > 0x14000561b : jmp rax load mem > 0x140001056 : mov rcx, [rax]; call [rip + 0x61e9]; add rsp, 0x38; ret > 0x140001057 : mov ecx, [rax]; call [rip + 0x61e9]; add rsp, 0x38; ret load reg > 0x1400012a3 : pop rax; ret > 0x140005d09 : pop rbx; ret > 0x1400013eb : pop rsi; ret > 0x140001ac9 : pop rdi; ret > 0x140006362 : pop rbp; ret pop pop ret > 0x1400012a3 : pop rax; ret > 0x1400013ea : pop rdi; pop rsi; ret > 0x140006061 : pop rdi; pop rsi; pop rbx; ret sp lifting > 0x140004ba4 : add rsp, 0x188; ret > 0x140004ba4 : add rsp, 0x188; ret > 0x140001404 : add rsp, 0x28; ret > 0x14000105f : add rsp, 0x38; ret > 0x1400010df : add rsp, 0x48; ret stack pivoting > 0x1400064f4 : xchg eax, esp; ret > 0x140001696 : leave ; call [rip + 0x5b43]; add rsp, 0x38; ret write mem > 0x140001658 : add [rbx + 0x48202444], ecx; add esp, 0x38; ret > 0x14000217d : add [rdi + 0x48], ebp; add esp, 0x38; ret > 0x14000291b : adc [rbx], esi; add [rax], al; add rsp, 0x38; ret