ropshell> use a10837f5f9c0341c035a5bb4941c250e (download) name : vuln (x86_64/RAW) base address : 0x0 total gadgets: 9882
ropshell> suggest call > 0x00000410 : call rax > 0x0000092d : call rbx > 0x0001caa3 : call rcx > 0x0000e8b7 : call rdx > 0x0004ec31 : call rsi jmp > 0x00050be4 : push rsp; ret > 0x00000a91 : jmp rax > 0x000801f1 : jmp rbx > 0x00022502 : jmp rcx > 0x0000d265 : jmp rdx load mem > 0x00012d10 : movzx eax, [rdx]; ret > 0x000a7d66 : mov edi, [rdx]; ret > 0x0008e241 : mov rax, [rsi + 0x10]; ret > 0x00018780 : mov rax, [rdi + 0x68]; ret > 0x0007e85c : mov eax, [rdx + 4]; ret load reg > 0x000156f4 : pop rax; ret > 0x00000d98 : pop rbx; ret > 0x0004bf16 : pop rdx; ret > 0x000100d3 : pop rsi; ret > 0x00000686 : pop rdi; ret pop pop ret > 0x0004bf15 : pop r10; ret > 0x0000da99 : pop r12; pop r13; ret > 0x000100ce : pop r12; pop r13; pop r14; ret > 0x0000067f : pop r12; pop r13; pop r14; pop r15; ret > 0x000025ae : pop r12; pop r13; pop r14; pop r15; pop rbp; ret sp lifting > 0x0000dbdd : add rsp, 0x118; ret > 0x0000dbdd : add rsp, 0x118; ret > 0x00049729 : add rsp, 0x28; ret > 0x0004917d : add rsp, 0x38; ret > 0x00049959 : add rsp, 0x58; ret stack pivoting > 0x0008d826 : mov rsp, rcx; ret > 0x000667a2 : xchg eax, esp; ret > 0x0008d827 : mov esp, ecx; ret > 0x0004a7f7 : mov esp, edx; call rbp > 0x0004add0 : mov esp, esi; call r15 syscall > 0x00049135 : syscall ; ret write mem > 0x00047238 : adc [rbx], eax; ret > 0x00043d81 : add [rax + 0x28d4802], ecx; ret > 0x00038936 : adc [rcx + 7], rdi; ret > 0x00038937 : adc [rcx + 7], edi; ret > 0x00046ebe : adc [rsi + 3], rdx; ret