ropshell> use cf87bb8fe5306c1c6409e34437ceb289 (download)
name         : stack_overflow_x64.exe (x86_64/PE)
base address : 0x140001000
total gadgets: 1181
ropshell> suggest "load mem"
> 0x1400066d6 : movzx ecx, [rdx]; sub eax, ecx; ret
> 0x140002498 : mov rcx, [rdx]; mov [rax], rcx; ret
> 0x140006bea : mov eax, [rcx + 0x18]; add rsp, 0x28; ret
> 0x14000fb3d : mov rsi, [r11 + 0x18]; mov rsp, r11; pop rdi; ret
> 0x14000a73e : mov rdi, [r11 + 0x20]; mov rsp, r11; pop r14; ret
> 0x14000db8e : mov r14, [r11 + 0x28]; mov rsp, r11; pop rbp; ret
> 0x14000fb3e : mov esi, [rbx + 0x18]; mov rsp, r11; pop rdi; ret
> 0x14000a73f : mov edi, [rbx + 0x20]; mov rsp, r11; pop r14; ret
> 0x1400066d3 : movzx eax, [rcx]; movzx ecx, [rdx]; sub eax, ecx; ret
> 0x14000f0ea : mov rbp, [r11 + 0x30]; mov rsp, r11; pop r14; pop rdi; pop rsi; ret
> 0x14000f0eb : mov ebp, [rbx + 0x30]; mov rsp, r11; pop r14; pop rdi; pop rsi; ret
> 0x14000a752 : mov rax, [rdx]; mov [rax], cl; inc [rdx]; movzx eax, cl; ret
> 0x14000a753 : mov eax, [rdx]; mov [rax], cl; inc [rdx]; movzx eax, cl; ret
> 0x14000fb39 : mov rbx, [r11 + 0x10]; mov rsi, [r11 + 0x18]; mov rsp, r11; pop rdi; ret
> 0x1400024a3 : movzx eax, [rdx + 2]; mov [rax], cx; mov [rax + 2], r8b; ret
> 0x140002553 : mov ecx, [rdx + 8]; mov [rax], r8; mov [rax + 8], ecx; ret
> 0x140002005 : mov rax, [rcx]; mov rax, [rax + 0x10]; call [rip + 0x13236]; add rsp, 0x28; ret
> 0x140014684 : mov rcx, [rdx + rcx]; bswap rax; bswap rcx; cmp rax, rcx; sbb eax, eax; sbb eax, -1; ret
> 0x140002550 : mov r8, [rdx]; mov ecx, [rdx + 8]; mov [rax], r8; mov [rax + 8], ecx; ret
> 0x14000da22 : mov edx, [rax + 0x10]; mov ecx, ebx; mov rax, rsi; mov r8, [rip + 0x7817]; call r8