ropshell> use e2e6300ab65c88cd764c427954658b8b (download)
name         : m2_rop_mod.exe (i386/PE)
base address : 0x401000
total gadgets: 319
ropshell> suggest
call
    > 0x00401024 : call eax
    > 0x0040615c : call ecx
jmp
    > 0x004012c5 : jmp eax
    > 0x00403e5c : jmp [eax]
    > 0x0040262a : jmp [ecx]
    > 0x00405853 : jmp [esi - 0x39]
    > 0x00401880 : push esp; mov ebp, [esp + 0x58]; add esp, 0x5c; ret
load mem
    > 0x00401bec : mov eax, [ebx + 4]; mov [esp], esi; call eax
load reg
    > 0x00401b71 : pop ebx; ret
    > 0x00406c48 : pop ecx; ret
    > 0x00401c0e : pop esi; ret
    > 0x0040210b : pop edi; ret
    > 0x0040132f : pop ebp; ret
pop pop ret
    > 0x0040132f : pop ebp; ret
    > 0x00406c47 : pop eax; pop ecx; ret
    > 0x00402109 : pop ebx; pop esi; pop edi; ret
    > 0x004015d1 : pop ebx; pop esi; pop edi; pop ebp; ret
    > 0x00405c15 : pop esp; pop ebx; pop esi; pop edi; pop ebp; ret
sp lifting
    > 0x00401c30 : add esp, 0x1c; ret
    > 0x00401c30 : add esp, 0x1c; ret
    > 0x004065ad : add esp, 0x24; ret
    > 0x00405734 : add esp, 0x3c; ret
    > 0x004052b5 : add esp, 0x4c; ret
stack pivoting
    > 0x00405e13 : xchg eax, esp; lea eax, [0]; ret
    > 0x004015ce : lea esp, [ebp - 0xc]; pop ebx; pop esi; pop edi; pop ebp; ret
    > 0x00401321 : leave ; ret
write mem
    > 0x00401437 : adc [eax], ebx; add cl, cl; ret