ropshell> use d056e7fe224475c023f235ec1615b4cb (download)
name         : lordofbinaries.exe (i386/PE)
base address : 0x10101000
total gadgets: 2019
ropshell> suggest
call
    > 0x10102e80 : call eax
    > 0x1010ca56 : call ebx
    > 0x10102c40 : call ecx
    > 0x101018bd : call esi
    > 0x10101ed4 : call edi
jmp
    > 0x10103289 : jmp eax
    > 0x10102c67 : jmp esi
    > 0x10101413 : jmp esp
    > 0x1010b256 : jmp [eax]
    > 0x10102a3c : jmp [ebx]
load mem
    > 0x10112a64 : mov eax, [edx + 4]; ret
    > 0x10104811 : mov eax, [ecx + 8]; pop ebp; ret
    > 0x10107f0e : mov eax, [esi + 4]; pop esi; ret
    > 0x1010b95e : mov eax, [ebp + 0xc]; pop ebp; ret
    > 0x10103412 : mov ebp, [ebx + 0x20]; jmp eax
load reg
    > 0x1010bdc3 : pop eax; ret
    > 0x10101edf : pop ebx; ret
    > 0x101017fd : pop ecx; ret
    > 0x101114fe : pop edx; ret
    > 0x101019fb : pop esi; ret
pop pop ret
    > 0x1010bdc3 : pop eax; ret
    > 0x101063f1 : pop eax; pop ebp; ret
    > 0x1010ae61 : pop ebx; pop edi; pop esi; ret
    > 0x1010b866 : pop eax; pop edi; pop esi; pop ebp; ret
    > 0x1010fe4a : pop ecx; pop ecx; pop esi; pop ebx; pop ebp; ret
sp lifting
    > 0x10108276 : add esp, 0x10; ret
    > 0x10108276 : add esp, 0x10; ret
stack pivoting
    > 0x1010b4e6 : mov esp, ebx; pop ebx; ret
    > 0x101012cd : mov esp, ebp; pop ebp; ret
    > 0x101128a9 : lea esp, [esp]; ret
    > 0x10106f27 : xchg eax, esp; inc ebp; call ecx
    > 0x1010ce65 : lea esp, [edi - 0x74330001]; call [ebp - 0x75]
write mem
    > 0x10101c8a : adc [eax], edx; ret
    > 0x101069b1 : add [ecx], eax; pop ebp; ret 0x10
    > 0x1010ac99 : add [ebx + 0x5d5b5fc7], ecx; ret 4
    > 0x10106482 : add [esi + 0x5b], ebx; ret
    > 0x1010672d : add [edi + 0x5e], ebx; ret