ropshell> use f368514b12955a07b9e3748f75661050 (download) name : exploit2.bin (x86_64/ELF) base address : 0x4011b0 total gadgets: 7260
ropshell> suggest "load reg" > 0x00451fd7 : pop rax; ret > 0x004020cb : pop rbx; ret > 0x004017ef : pop rdx; ret > 0x0040f30e : pop rsi; ret > 0x004018e2 : pop rdi; ret > 0x00401d41 : pop rbp; ret > 0x004031e0 : pop rsp; ret > 0x004031df : pop r12; ret > 0x00419d88 : pop r13; ret > 0x0040f30d : pop r14; ret > 0x004018e1 : pop r15; ret > 0x004aec57 : pop rcx; jmp rcx > 0x004abfac : mov rax, [rsp]; add rsp, 0x38; ret > 0x004abfad : mov eax, [rsp]; add rsp, 0x38; ret > 0x00453202 : mov edi, [rsp]; call rbx > 0x00450bfa : mov rsi, [rsp + 0x18]; call rbx > 0x0049ccfe : mov rdi, [rsp + 0x18]; call rax > 0x00450bfb : mov esi, [rsp + 0x18]; call rbx > 0x004b0527 : mov edx, [rsp]; mov rdi, r14; call rbp > 0x0049c1aa : mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax] > 0x0049c1ab : mov ecx, [rsp + 0x40]; add rsp, 0x48; jmp [rax] > 0x0041fd8e : pop r8; add [rax], al; add [rax], al; movups xmm[rbx + 0x48], xmm0; pop rbx; ret > 0x0048e6ca : mov r9, [rsp + 0x10]; mov rdi, r12; mov rsi, [rsp + 0x18]; call rbx > 0x0049c1a5 : mov rdx, [rsp + 0x38]; mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax] > 0x00465977 : mov rbx, [rsp + 8]; nop [rax]; mov rsi, r13; mov rdi, r14; mov rdx, r12; call rbp > 0x00465978 : mov ebx, [rsp + 8]; nop [rax]; mov rsi, r13; mov rdi, r14; mov rdx, r12; call rbp > 0x0040f85a : mov r12, [rsp + 0x20]; nop ; mov rax, [rsp]; mov rdx, r14; mov rsi, r13; mov rdi, r12; call rax > 0x0040f85b : mov esp, [rsp + 0x20]; nop ; mov rax, [rsp]; mov rdx, r14; mov rsi, r13; mov rdi, r12; call rax > 0x0049c1a0 : mov r11, [rsp + 0x30]; mov rdx, [rsp + 0x38]; mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax] > 0x00461ee6 : mov r8, [rsp + 0x48]; mov rcx, [rsp + 0x18]; mov rsi, [rsp + 0x40]; mov rdi, [rsp + 0x38]; call r15 > 0x00465892 : mov r13, [rsp + 0x10]; add r13, [rsp + 8]; lea r15, [rax + r14]; mov rdx, rbp; mov rsi, r12; mov rdi, r13; call rbx > 0x00465893 : mov ebp, [rsp + 0x10]; add r13, [rsp + 8]; lea r15, [rax + r14]; mov rdx, rbp; mov rsi, r12; mov rdi, r13; call rbx > 0x0049c19b : mov r10, [rsp + 0x28]; mov r11, [rsp + 0x30]; mov rdx, [rsp + 0x38]; mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]