ropshell> use 75bb692f5cd51ba4143a42fc4948b025 (download)
name         : readme_revenge (x86_64/ELF)
base address : 0x400300
total gadgets: 7758
ropshell> suggest
call
    > 0x00400c82 : call rax
    > 0x0043724e : call rbx
    > 0x004124e7 : call rcx
    > 0x00407026 : call rdx
    > 0x00412488 : call rsi
jmp
    > 0x00400951 : jmp rax
    > 0x0046dc22 : jmp rbx
    > 0x00422264 : jmp rcx
    > 0x00405b25 : jmp rdx
    > 0x00440a5f : jmp rsi
load mem
    > 0x0046afda : mov eax, [rcx]; ret
    > 0x0040a800 : movzx eax, [rdx]; ret
    > 0x0048a731 : mov rax, [rsi + 0x10]; ret
    > 0x0040ed30 : mov rax, [rdi + 0x68]; ret
    > 0x0048a732 : mov eax, [rsi + 0x10]; ret
load reg
    > 0x0043364c : pop rax; ret
    > 0x00400da1 : pop rbx; ret
    > 0x00435435 : pop rdx; ret
    > 0x004059d6 : pop rsi; ret
    > 0x00400525 : pop rdi; ret
pop pop ret
    > 0x00435434 : pop r10; ret
    > 0x00400481 : pop r12; pop r13; ret
    > 0x004059d1 : pop r12; pop r13; pop r14; ret
    > 0x0040051e : pop r12; pop r13; pop r14; pop r15; ret
    > 0x00401c2d : pop r12; pop r13; pop r14; pop r15; pop rbp; ret
sp lifting
    > 0x0045e0e9 : add rsp, 0x100; ret
    > 0x0045e0e9 : add rsp, 0x100; ret
    > 0x0043335a : add rsp, 0x28; ret
    > 0x00442ab1 : add rsp, 0x38; ret
    > 0x00433649 : add rsp, 0x58; ret
stack pivoting
    > 0x00489d16 : mov rsp, rcx; ret
    > 0x00489d17 : mov esp, ecx; ret
    > 0x0046aca4 : xchg esp, edi; inc [rbp - 0x76cc8740]; ret
    > 0x00434117 : mov esp, edx; call rbp
    > 0x0046fcd8 : mov rsp, r8; mov rbp, r9; jmp rdx
syscall
    > 0x0045fa15 : syscall ; ret
write mem
    > 0x0041a8dc : add [rax], r8; ret
    > 0x0041b058 : adc [rbx], eax; ret
    > 0x0042e601 : add [rax + 0x28d4802], ecx; ret
    > 0x00429356 : adc [rcx + 7], rdi; ret
    > 0x00429357 : adc [rcx + 7], edi; ret