ropshell> use d056e7fe224475c023f235ec1615b4cb (download)
name         : lordofbinaries.exe (i386/PE)
base address : 0x10101000
total gadgets: 2019
ropshell> suggest "load mem"
> 0x10112a64 : mov eax, [edx + 4]; ret
> 0x10104811 : mov eax, [ecx + 8]; pop ebp; ret
> 0x10107f0e : mov eax, [esi + 4]; pop esi; ret
> 0x1010b95e : mov eax, [ebp + 0xc]; pop ebp; ret
> 0x10103412 : mov ebp, [ebx + 0x20]; jmp eax
> 0x10105bff : mov eax, [edi]; pop edi; mov esp, ebp; pop ebp; ret
> 0x10104753 : mov ecx, [ebp + 8]; call [ebp + 0xc]; pop ebp; ret 0xc
> 0x10107e57 : movzx eax, [edx]; movzx ecx, [ecx]; sub eax, ecx; pop esi; pop ebp; ret
> 0x10102837 : mov ecx, [edx + ecx]; add ecx, esi; add eax, ecx; pop esi; pop ebp; ret
> 0x10101ccd : mov ecx, [eax + 4]; or [eax], 2; mov [eax + 4], ecx; ret
> 0x10103280 : mov ebx, [ebp + 0xc]; mov ebp, [ebp - 4]; mov esp, [ebx - 4]; jmp eax
> 0x1010b0d2 : mov eax, [esi]; mov eax, [eax]; mov eax, [eax + 0x48];  inc [eax]; pop esi; ret
> 0x10102834 : mov edx, [esi + edx]; mov ecx, [edx + ecx]; add ecx, esi; add eax, ecx; pop esi; pop ebp; ret
> 0x10103275 : mov eax, [ebx]; mov fs:[0], eax; mov eax, [ebp + 8]; mov ebx, [ebp + 0xc]; mov ebp, [ebp - 4]; mov esp, [ebx - 4]; jmp eax