Solution by tgsm on 2020-05-09 07:04:
Solution by PigAsu on 2020-05-10 14:05:
Solution by 0xThiebaut on 2020-05-13 21:31:
This took me more time than I'd like to admit... TIL that an std basic string is more than just a string. No wonder dumping the registers before the comparison didn't yield zero-terminated strings...
Solution by karcher on 2020-06-11 01:42:
Thank you for the nice crackme, it's very good for beginners
Solution by zsarge on 2020-06-28 19:17:
This writeup is a PDF written for absolute beginners. Hopefully it is helpful for you.
Solution by patoLocosc on 2020-07-15 03:10:
Just a simple txt file explaining my approach to solve this easy problem :).
Solution by arkountos on 2020-12-18 14:28:
Two solutions included
Solution by J_Tanzanite on 2021-03-17 14:37:
I'm new to reverse engineering, and although I've experimented a little with Ghidra, I've never tested C++ binaries. This is my first time doing so.
Anyway, hope my solution isn't too much of a mess.
Solution by GaneshG on 2021-04-20 12:02:
Markdown.
"": Commands typed into terminal
Solution by Shadorain on 2021-04-23 02:31:
Here is a simple solution for this simple crackme, should be explained well. If you want a rendered markdown pretty solution: https://shadorain.github.io/blog/Security/Reversing/Crackme_easyAF
Solution by 2ourc3 on 2022-12-05 12:24:
Write-up by 2ourc3 (bushido-sec.com)
Solution by chgnrdv on 2023-01-23 21:21:
Solution by evlc on 2023-04-19 15:32:
I don't like how r2ghidra shows C++ methods, so I just used r2dec.
Solution by RevBeginner on 2024-05-16 07:25:
Basic static analysis
Solution by Alstor21 on 2025-08-30 02:39:
Brand new to crackmes and reverse engineering, can't wait to learn more
Solution by SOURAV_BOSE on 2025-09-16 11:27:
easyAF solved and provided detailed writeup
Solution by b0bd0g on 2026-01-26 02:50:
Detailed walk through of the program flow and explanation as to why looking at high level disassembly is not sufficient and why we must analyze the raw assembly in order to find the answer.