Skip to content

NROFF (.nroff)

.nroff file signature | text/troff

Safe

Magic Bytes

Offset 0
2E 5C 22

Sources: Apache Tika

All Known Signatures

5 signature variants are documented for .nroff files across multiple sources.

Hex Signature Offset Sources
2E 5C 22 0 Apache Tika
27 5C 22 0 Apache Tika
27 2E 5C 22 0 Apache Tika
5C 22 0 Apache Tika
27 27 27 0 Apache Tika

Extension

.nroff

MIME Type

text/troff

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .nroff files in Python

Python
def is_nroff(file_path: str) -> bool:
    """Check if file is a valid NROFF by magic bytes."""
    signature = bytes([0x2E, 0x5C, 0x22])
    with open(file_path, "rb") as f:
        return f.read(3) == signature

How to validate .nroff files in Node.js

Node.js
function isNROFF(buffer: Buffer): boolean {
  const signature = Buffer.from([0x2E, 0x5C, 0x22]);
  return buffer.subarray(0, 3).equals(signature);
}

How to validate .nroff files in Go

Go
func IsNROFF(data []byte) bool {
    signature := []byte{0x2E, 0x5C, 0x22}
    if len(data) < 3 {
        return false
    }
    return bytes.Equal(data[:3], signature)
}

API Endpoint

GET /api/v1/nroff
curl https://filesignature.org/api/v1/nroff

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .nroff file?

A .nroff file is a NROFF file.

What are the magic bytes for .nroff files?

The magic bytes for NROFF files are 2E 5C 22 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .nroff file?

To validate a .nroff file, read the first bytes of the file and compare them against the known magic bytes (2E 5C 22) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .nroff files?

The primary MIME type for .nroff files is text/troff.

Is it safe to open .nroff files?

NROFF (.nroff) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.