Reverse Engineering Crackme with Radare2 (crackme0x00a) February 20, 2017 by Pepe 0 Comments Here I replace the JNZ instruction by JZ to skip the check. It’s not the most elegant way to resolve it, as in this case it’s possible to view directly the string value. Tags: CTF Radare Reverse Engineering Post navigation Crackme challenge resolution with Radare2 (crackme0x01) → Author Pepe