.\" This manual is Copyright 2012 by pi-rho .\" .\" This program is free software: you can redistribute it and/or modify .\" it under the terms of the GNU General Public License as published by .\" the Free Software Foundation, either version 3 of the License, or .\" (at your option) any later version. .\" .\" This package is distributed in the hope that it will be useful, .\" but WITHOUT ANY WARRANTY; without even the implied warranty of .\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the .\" GNU General Public License for more details. .\" .\" You should have received a copy of the GNU General Public License .\" along with this program. If not, see . .\" .\" On Debian systems, the complete text of the GNU General .\" Public License version 3 can be found in "/usr/share/common-licenses/GPL-3". . .Dd March 3, 2012 .Dt REPR 1 .Os "Network Reverse Engineering Toolkit" . .Sh NAME .Nm repr .Nd escape unprintable characters . .Sh SYNOPSIS .Nm repr .Op Fl h | Fl v .Nm repr .Op Ar . .Sh DESCRIPTION The basic concept for this utility is to emulate python's repr() function. Input bytes are escaped using Python's byte notation if they do not fall within the printable range. . .Sh USAGE With a file specified .D1 Nm repr Pa data.bin .Pp As a filter .D1 ... | Nm repr | ... . .Sh OPTIONS A summary of the options supported by .Nm repr is included below. . .Bl -tag -width Ds .It Fl h usage information .It Fl v the program's version .El . .Sh SEE ALSO .Xr hdng 1 , .Xr xor 1 . .Sh AUTHORS .An Zephyr Aq Ad zephyr@dirtbags.net , .An pi-rho Aq Ad pi-rho@tyr.cx