Crackme with Radare2 (crackme0x00a) Here I replace the JNZ instruction by JZ to skip the check. It’s not the most elegant way to resolve it, as in this case it’s possible to view directly the string value. Feb 20, 2017 reverse-engineering