ropshell> use 1ff0163f62112cb49e9000e0bc8c0e86 (download)
name         : vuln.exe (x86_64/PE)
base address : 0x140001000
total gadgets: 1233
ropshell> suggest "load mem"
> 0x1400075c2 : movzx ecx, [rdx]; sub eax, ecx; ret
> 0x140002858 : mov rcx, [rdx]; mov [rax], rcx; ret
> 0x14000b46e : mov eax, [rcx + 0x18]; add rsp, 0x28; ret
> 0x14000e8a1 : mov rsi, [r11 + 0x18]; mov rsp, r11; pop rdi; ret
> 0x14000b446 : mov rdi, [r11 + 0x20]; mov rsp, r11; pop r14; ret
> 0x14000e16e : mov r14, [r11 + 0x28]; mov rsp, r11; pop rbp; ret
> 0x14000e8a2 : mov esi, [rbx + 0x18]; mov rsp, r11; pop rdi; ret
> 0x14000b447 : mov edi, [rbx + 0x20]; mov rsp, r11; pop r14; ret
> 0x1400075bf : movzx eax, [rcx]; movzx ecx, [rdx]; sub eax, ecx; ret
> 0x140008367 : mov rbp, [r11 + 0x30]; mov rsp, r11; pop r14; pop rdi; pop rsi; ret
> 0x140008368 : mov ebp, [rbx + 0x30]; mov rsp, r11; pop r14; pop rdi; pop rsi; ret
> 0x14000b482 : mov rax, [rdx]; mov [rax], cl; inc [rdx]; movzx eax, cl; ret
> 0x14000b483 : mov eax, [rdx]; mov [rax], cl; inc [rdx]; movzx eax, cl; ret
> 0x14000b5e7 : movzx ecx, [rax]; inc rax; mov [rdx], rax; mov eax, ecx; add rsp, 0x28; ret
> 0x14000e89d : mov rbx, [r11 + 0x10]; mov rsi, [r11 + 0x18]; mov rsp, r11; pop rdi; ret
> 0x140002863 : movzx eax, [rdx + 2]; mov [rax], cx; mov [rax + 2], r8b; ret
> 0x140002913 : mov ecx, [rdx + 8]; mov [rax], r8; mov [rax + 8], ecx; ret
> 0x140013024 : mov rcx, [rdx + rcx]; bswap rax; bswap rcx; cmp rax, rcx; sbb eax, eax; sbb eax, -1; ret
> 0x14000b5e4 : mov rax, [rcx]; movzx ecx, [rax]; inc rax; mov [rdx], rax; mov eax, ecx; add rsp, 0x28; ret
> 0x140002910 : mov r8, [rdx]; mov ecx, [rdx + 8]; mov [rax], r8; mov [rax + 8], ecx; ret
> 0x14000e007 : mov edx, [rax + 0x10]; mov ecx, ebx; mov rax, r15; mov r8, [rip + 0x822a]; call r8