ropshell> use a10837f5f9c0341c035a5bb4941c250e (download)
name         : vuln (x86_64/RAW)
base address : 0x0
total gadgets: 9882
ropshell> suggest
call
    > 0x00000410 : call rax
    > 0x0000092d : call rbx
    > 0x0001caa3 : call rcx
    > 0x0000e8b7 : call rdx
    > 0x0004ec31 : call rsi
jmp
    > 0x00050be4 : push rsp; ret
    > 0x00000a91 : jmp rax
    > 0x000801f1 : jmp rbx
    > 0x00022502 : jmp rcx
    > 0x0000d265 : jmp rdx
load mem
    > 0x00012d10 : movzx eax, [rdx]; ret
    > 0x000a7d66 : mov edi, [rdx]; ret
    > 0x0008e241 : mov rax, [rsi + 0x10]; ret
    > 0x00018780 : mov rax, [rdi + 0x68]; ret
    > 0x0007e85c : mov eax, [rdx + 4]; ret
load reg
    > 0x000156f4 : pop rax; ret
    > 0x00000d98 : pop rbx; ret
    > 0x0004bf16 : pop rdx; ret
    > 0x000100d3 : pop rsi; ret
    > 0x00000686 : pop rdi; ret
pop pop ret
    > 0x0004bf15 : pop r10; ret
    > 0x0000da99 : pop r12; pop r13; ret
    > 0x000100ce : pop r12; pop r13; pop r14; ret
    > 0x0000067f : pop r12; pop r13; pop r14; pop r15; ret
    > 0x000025ae : pop r12; pop r13; pop r14; pop r15; pop rbp; ret
sp lifting
    > 0x0000dbdd : add rsp, 0x118; ret
    > 0x0000dbdd : add rsp, 0x118; ret
    > 0x00049729 : add rsp, 0x28; ret
    > 0x0004917d : add rsp, 0x38; ret
    > 0x00049959 : add rsp, 0x58; ret
stack pivoting
    > 0x0008d826 : mov rsp, rcx; ret
    > 0x000667a2 : xchg eax, esp; ret
    > 0x0008d827 : mov esp, ecx; ret
    > 0x0004a7f7 : mov esp, edx; call rbp
    > 0x0004add0 : mov esp, esi; call r15
syscall
    > 0x00049135 : syscall ; ret
write mem
    > 0x00047238 : adc [rbx], eax; ret
    > 0x00043d81 : add [rax + 0x28d4802], ecx; ret
    > 0x00038936 : adc [rcx + 7], rdi; ret
    > 0x00038937 : adc [rcx + 7], edi; ret
    > 0x00046ebe : adc [rsi + 3], rdx; ret