ropshell> use a10837f5f9c0341c035a5bb4941c250e (download)
name         : vuln (x86_64/ELF)
base address : 0x4004d0
total gadgets: 8683
ropshell> suggest
call
    > 0x00401147 : call rax
    > 0x0040092d : call rbx
    > 0x0041caa3 : call rcx
    > 0x0040e8b7 : call rdx
    > 0x0044ec31 : call rsi
jmp
    > 0x00450be4 : push rsp; ret
    > 0x00400a91 : jmp rax
    > 0x004801f1 : jmp rbx
    > 0x00422502 : jmp rcx
    > 0x0040d265 : jmp rdx
load mem
    > 0x00412d10 : movzx eax, [rdx]; ret
    > 0x0048e241 : mov rax, [rsi + 0x10]; ret
    > 0x00418780 : mov rax, [rdi + 0x68]; ret
    > 0x0047e85c : mov eax, [rdx + 4]; ret
    > 0x0048e242 : mov eax, [rsi + 0x10]; ret
load reg
    > 0x004156f4 : pop rax; ret
    > 0x00400d98 : pop rbx; ret
    > 0x0044bf16 : pop rdx; ret
    > 0x004100d3 : pop rsi; ret
    > 0x00400686 : pop rdi; ret
pop pop ret
    > 0x0044bf15 : pop r10; ret
    > 0x0040da99 : pop r12; pop r13; ret
    > 0x004100ce : pop r12; pop r13; pop r14; ret
    > 0x0040067f : pop r12; pop r13; pop r14; pop r15; ret
    > 0x004025ae : pop r12; pop r13; pop r14; pop r15; pop rbp; ret
sp lifting
    > 0x0040dbdd : add rsp, 0x118; ret
    > 0x0040dbdd : add rsp, 0x118; ret
    > 0x00449729 : add rsp, 0x28; ret
    > 0x0044917d : add rsp, 0x38; ret
    > 0x00449959 : add rsp, 0x58; ret
stack pivoting
    > 0x0048d826 : mov rsp, rcx; ret
    > 0x004667a2 : xchg eax, esp; ret
    > 0x0048d827 : mov esp, ecx; ret
    > 0x0044a7f7 : mov esp, edx; call rbp
    > 0x0044add0 : mov esp, esi; call r15
syscall
    > 0x00449135 : syscall ; ret
write mem
    > 0x00447238 : adc [rbx], eax; ret
    > 0x00443d81 : add [rax + 0x28d4802], ecx; ret
    > 0x00438936 : adc [rcx + 7], rdi; ret
    > 0x00438937 : adc [rcx + 7], edi; ret
    > 0x00446ebe : adc [rsi + 3], rdx; ret