ropshell> use 93719b7d673d5d852286c53060fcf654 (download) name : GoCrackMe2 (x86_64/ELF) base address : 0x401000 total gadgets: 4286
ropshell> suggest call > 0x00407a0e : call rax > 0x00422251 : call rbx > 0x00405dd1 : call rcx > 0x00434691 : call rdx > 0x004049c4 : call rsi jmp > 0x0040b5c7 : push rsp; ret > 0x00455ad0 : jmp rax > 0x00462d3e : jmp rbx > 0x00463c48 : jmp rdi > 0x00459bec : jmp [rax] load mem > 0x004871ed : mov rax, [rcx]; ret > 0x004871ee : mov eax, [rcx]; ret > 0x00435405 : mov rbx, [rcx + 0x10]; ret > 0x00435406 : mov ebx, [rcx + 0x10]; ret > 0x00407a0b : mov rax, [rdx]; call rax load reg > 0x004385e1 : pop rbx; ret > 0x00401031 : pop rbp; ret > 0x00404291 : pop rax; pop rbp; ret > 0x0047380f : pop rdx; adc [rax - 1], cl; ret > 0x00448a65 : pop rsp; or cl, [rax]; ret pop pop ret > 0x00401031 : pop rbp; ret > 0x00404291 : pop rax; pop rbp; ret sp lifting > 0x004670c7 : add rsp, 0x30; ret > 0x004670c7 : add rsp, 0x30; ret stack pivoting > 0x00406349 : xchg eax, esp; ret > 0x004674e0 : mov rsp, rbx; pop rbp; ret > 0x004674e1 : mov esp, ebx; pop rbp; ret > 0x0046585a : mov rsp, rsi; mov [rsp + 0x20], eax; pop rbp; ret > 0x0046585b : mov esp, esi; mov [rsp + 0x20], eax; pop rbp; ret syscall > 0x004670e9 : syscall ; ret write mem > 0x0042f1d9 : add [rax + 0x110], rbx; ret > 0x0042f1da : add [rax + 0x110], ebx; ret > 0x0042a7f5 : add [rax + 0x39], ecx; ret > 0x004600e4 : adc [rbx + 8], eax; ret > 0x0042f1bd : add [rdx + 0x118], ebx; ret