This document describes a tool called EasyROP that can automatically generate ROP chains to bypass W⊕X protections on Windows operating systems. It does this by modeling the ROP chain construction as a Turing machine, where individual ROP gadgets (short sequences of existing code ending in a return) act as the basic operations of the machine. By chaining these gadgets together, the tool can perform Turing-complete computation and deactivate W⊕X protections, allowing arbitrary code execution on the target system. The document outlines the tool's design and evaluates its ability to generate exploit chains through a case study on a real Windows vulnerability.