ropshell> use a10837f5f9c0341c035a5bb4941c250e (download)
name         : vuln (x86_64/RAW)
base address : 0x0
total gadgets: 9882
ropshell> suggest "load reg"
> 0x000156f4 : pop rax; ret
> 0x00000d98 : pop rbx; ret
> 0x0004bf16 : pop rdx; ret
> 0x000100d3 : pop rsi; ret
> 0x00000686 : pop rdi; ret
> 0x00000a98 : pop rbp; ret
> 0x00001d53 : pop rsp; ret
> 0x0004bf15 : pop r10; ret
> 0x00005da4 : pop r12; ret
> 0x0000da9b : pop r13; ret
> 0x000100d2 : pop r14; ret
> 0x00000685 : pop r15; ret
> 0x00038be2 : pop rcx; jmp [rdx - 0x2f]
> 0x0008ab39 : mov rax, [rsp]; add rsp, 0x38; ret
> 0x0008ab3a : mov eax, [rsp]; add rsp, 0x38; ret
> 0x00073e9a : mov edi, [rsp]; call rbp
> 0x00082748 : mov rdx, [rsp + 0x10]; call rdx
> 0x000203a8 : mov rsi, [rsp + 0x68]; call rax
> 0x0008ef7d : mov rdi, [rsp + 0x10]; call r14
> 0x00082749 : mov edx, [rsp + 0x10]; call rdx
> 0x000203a9 : mov esi, [rsp + 0x68]; call rax
> 0x00081d16 : mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]
> 0x00081d17 : mov ecx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]
> 0x000166aa : pop r8; add [rax], al; add [rax], al; mov [rbx + 0x50], 0; pop rbx; ret
> 0x00011aec : mov r8, [rsp + 0x18]; lea rsi, [rdi + 0x58]; mov rdi, rax; call [rax + 8]
> 0x0005573c : mov r9, [rsp + 0x20]; mov rsi, [rsp + 0x40]; mov rdi, [rsp + 0x38]; call r14
> 0x00081d0c : mov r11, [rsp + 0x30]; mov rdx, [rsp + 0x38]; mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]
> 0x00081d0d : mov ebx, [rsp + 0x30]; mov rdx, [rsp + 0x38]; mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]
> 0x0005b1f2 : mov r13, [rsp + 0x10]; add r13, [rsp + 8]; lea rbx, [rax + r15]; mov rdx, r12; mov rsi, r14; mov rdi, r13; call rbp
> 0x0005b1f3 : mov ebp, [rsp + 0x10]; add r13, [rsp + 8]; lea rbx, [rax + r15]; mov rdx, r12; mov rsi, r14; mov rdi, r13; call rbp
> 0x00081d07 : mov r10, [rsp + 0x28]; mov r11, [rsp + 0x30]; mov rdx, [rsp + 0x38]; mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]