ropshell> use 622e691e1c37ffbcf0a3317f15c202f6 (download)
name         : A..Mazing.exe (x86_64/PE)
base address : 0x140001000
total gadgets: 326
ropshell> suggest
call
    > 0x140006a0b : call [rax + 0x20c48348]; pop rbp; ret
jmp
    > 0x14000561b : jmp rax
load mem
    > 0x140001056 : mov rcx, [rax]; call [rip + 0x61e9]; add rsp, 0x38; ret
    > 0x140001057 : mov ecx, [rax]; call [rip + 0x61e9]; add rsp, 0x38; ret
load reg
    > 0x1400012a3 : pop rax; ret
    > 0x140005d09 : pop rbx; ret
    > 0x1400013eb : pop rsi; ret
    > 0x140001ac9 : pop rdi; ret
    > 0x140006362 : pop rbp; ret
pop pop ret
    > 0x1400012a3 : pop rax; ret
    > 0x1400013ea : pop rdi; pop rsi; ret
    > 0x140006061 : pop rdi; pop rsi; pop rbx; ret
sp lifting
    > 0x140004ba4 : add rsp, 0x188; ret
    > 0x140004ba4 : add rsp, 0x188; ret
    > 0x140001404 : add rsp, 0x28; ret
    > 0x14000105f : add rsp, 0x38; ret
    > 0x1400010df : add rsp, 0x48; ret
stack pivoting
    > 0x1400064f4 : xchg eax, esp; ret
    > 0x140001696 : leave ; call [rip + 0x5b43]; add rsp, 0x38; ret
write mem
    > 0x140001658 : add [rbx + 0x48202444], ecx; add esp, 0x38; ret
    > 0x14000217d : add [rdi + 0x48], ebp; add esp, 0x38; ret
    > 0x14000291b : adc [rbx], esi; add [rax], al; add rsp, 0x38; ret