ropshell> use a10837f5f9c0341c035a5bb4941c250e (download)
name         : vuln (x86_64/ELF)
base address : 0x4004d0
total gadgets: 8683
ropshell> suggest "load reg"
> 0x004156f4 : pop rax; ret
> 0x00400d98 : pop rbx; ret
> 0x0044bf16 : pop rdx; ret
> 0x004100d3 : pop rsi; ret
> 0x00400686 : pop rdi; ret
> 0x00400a98 : pop rbp; ret
> 0x00401d53 : pop rsp; ret
> 0x0044bf15 : pop r10; ret
> 0x00405da4 : pop r12; ret
> 0x0040da9b : pop r13; ret
> 0x004100d2 : pop r14; ret
> 0x00400685 : pop r15; ret
> 0x00438be2 : pop rcx; jmp [rdx - 0x2f]
> 0x0048ab39 : mov rax, [rsp]; add rsp, 0x38; ret
> 0x0048ab3a : mov eax, [rsp]; add rsp, 0x38; ret
> 0x00473e9a : mov edi, [rsp]; call rbp
> 0x00482748 : mov rdx, [rsp + 0x10]; call rdx
> 0x004203a8 : mov rsi, [rsp + 0x68]; call rax
> 0x0048ef7d : mov rdi, [rsp + 0x10]; call r14
> 0x00482749 : mov edx, [rsp + 0x10]; call rdx
> 0x004203a9 : mov esi, [rsp + 0x68]; call rax
> 0x00481d16 : mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]
> 0x00481d17 : mov ecx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]
> 0x004166aa : pop r8; add [rax], al; add [rax], al; mov [rbx + 0x50], 0; pop rbx; ret
> 0x00411aec : mov r8, [rsp + 0x18]; lea rsi, [rdi + 0x58]; mov rdi, rax; call [rax + 8]
> 0x0045573c : mov r9, [rsp + 0x20]; mov rsi, [rsp + 0x40]; mov rdi, [rsp + 0x38]; call r14
> 0x00481d0c : mov r11, [rsp + 0x30]; mov rdx, [rsp + 0x38]; mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]
> 0x00481d0d : mov ebx, [rsp + 0x30]; mov rdx, [rsp + 0x38]; mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]
> 0x0045b1f2 : mov r13, [rsp + 0x10]; add r13, [rsp + 8]; lea rbx, [rax + r15]; mov rdx, r12; mov rsi, r14; mov rdi, r13; call rbp
> 0x0045b1f3 : mov ebp, [rsp + 0x10]; add r13, [rsp + 8]; lea rbx, [rax + r15]; mov rdx, r12; mov rsi, r14; mov rdi, r13; call rbp
> 0x00481d07 : mov r10, [rsp + 0x28]; mov r11, [rsp + 0x30]; mov rdx, [rsp + 0x38]; mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]