ropshell> use f368514b12955a07b9e3748f75661050 (download)
name         : exploit2.bin (x86_64/ELF)
base address : 0x4011b0
total gadgets: 7260
ropshell> suggest "load reg"
> 0x00451fd7 : pop rax; ret
> 0x004020cb : pop rbx; ret
> 0x004017ef : pop rdx; ret
> 0x0040f30e : pop rsi; ret
> 0x004018e2 : pop rdi; ret
> 0x00401d41 : pop rbp; ret
> 0x004031e0 : pop rsp; ret
> 0x004031df : pop r12; ret
> 0x00419d88 : pop r13; ret
> 0x0040f30d : pop r14; ret
> 0x004018e1 : pop r15; ret
> 0x004aec57 : pop rcx; jmp rcx
> 0x004abfac : mov rax, [rsp]; add rsp, 0x38; ret
> 0x004abfad : mov eax, [rsp]; add rsp, 0x38; ret
> 0x00453202 : mov edi, [rsp]; call rbx
> 0x00450bfa : mov rsi, [rsp + 0x18]; call rbx
> 0x0049ccfe : mov rdi, [rsp + 0x18]; call rax
> 0x00450bfb : mov esi, [rsp + 0x18]; call rbx
> 0x004b0527 : mov edx, [rsp]; mov rdi, r14; call rbp
> 0x0049c1aa : mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]
> 0x0049c1ab : mov ecx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]
> 0x0041fd8e : pop r8; add [rax], al; add [rax], al; movups xmm[rbx + 0x48], xmm0; pop rbx; ret
> 0x0048e6ca : mov r9, [rsp + 0x10]; mov rdi, r12; mov rsi, [rsp + 0x18]; call rbx
> 0x0049c1a5 : mov rdx, [rsp + 0x38]; mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]
> 0x00465977 : mov rbx, [rsp + 8]; nop [rax]; mov rsi, r13; mov rdi, r14; mov rdx, r12; call rbp
> 0x00465978 : mov ebx, [rsp + 8]; nop [rax]; mov rsi, r13; mov rdi, r14; mov rdx, r12; call rbp
> 0x0040f85a : mov r12, [rsp + 0x20]; nop ; mov rax, [rsp]; mov rdx, r14; mov rsi, r13; mov rdi, r12; call rax
> 0x0040f85b : mov esp, [rsp + 0x20]; nop ; mov rax, [rsp]; mov rdx, r14; mov rsi, r13; mov rdi, r12; call rax
> 0x0049c1a0 : mov r11, [rsp + 0x30]; mov rdx, [rsp + 0x38]; mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]
> 0x00461ee6 : mov r8, [rsp + 0x48]; mov rcx, [rsp + 0x18]; mov rsi, [rsp + 0x40]; mov rdi, [rsp + 0x38]; call r15
> 0x00465892 : mov r13, [rsp + 0x10]; add r13, [rsp + 8]; lea r15, [rax + r14]; mov rdx, rbp; mov rsi, r12; mov rdi, r13; call rbx
> 0x00465893 : mov ebp, [rsp + 0x10]; add r13, [rsp + 8]; lea r15, [rax + r14]; mov rdx, rbp; mov rsi, r12; mov rdi, r13; call rbx
> 0x0049c19b : mov r10, [rsp + 0x28]; mov r11, [rsp + 0x30]; mov rdx, [rsp + 0x38]; mov rcx, [rsp + 0x40]; add rsp, 0x48; jmp [rax]