ropshell> use acb0504a5cd299154111632d9f240d4e (download)
name         : brokenwindow.exe (i386/PE)
base address : 0x401000
total gadgets: 937
ropshell> suggest
call
    > 0x00401ea2 : call eax
    > 0x0040907b : call ebx
    > 0x00402013 : call ecx
    > 0x00406b61 : call edx
    > 0x0040207f : call esi
jmp
    > 0x00401a39 : jmp eax
    > 0x00408800 : jmp esi
    > 0x004034bb : jmp [eax]
    > 0x004050b0 : jmp [ebx]
    > 0x0040762a : jmp [ecx]
load mem
    > 0x004036f0 : mov eax, [ebp + 0x10]; inc [eax]; pop ebp; ret
    > 0x00402b22 : mov eax, [ecx + 4]; mov [esi + 4], eax; mov eax, esi; pop esi; pop ebp; ret 4
load reg
    > 0x0040876e : pop ebx; ret
    > 0x00401388 : pop ecx; ret
    > 0x0040133e : pop esi; ret
    > 0x00401b7d : pop edi; ret
    > 0x00401067 : pop ebp; ret
pop pop ret
    > 0x00401067 : pop ebp; ret
    > 0x00403803 : pop eax; pop ebp; ret
    > 0x00401e30 : pop eax; pop esi; pop edi; ret
    > 0x00403796 : pop ebx; pop edi; pop esi; pop ebp; ret
    > 0x0040833d : pop ecx; pop edi; pop esi; pop ebx; pop ebp; ret
sp lifting
    > 0x004029a1 : add esp, 0x14; ret
    > 0x004029a1 : add esp, 0x14; ret
stack pivoting
    > 0x004012ec : mov esp, ebp; pop ebp; ret
    > 0x004055ac : xchg eax, esp; bound eax, [ecx]; call esi
    > 0x0040d61b : leave ; ret
write mem
    > 0x00405f9e : add [ecx], eax; pop ebp; ret
    > 0x004089e3 : add [esi + 0x5d], ebx; ret
    > 0x00401b95 : add [ebx + 0x5e0c2444], ecx; pop edi; ret
    > 0x00401ba9 : add [edx + 0x47880246], ecx; add cl, [ebx + 0x5e0c2444]; pop edi; ret