I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
scala-macros
jpa-2.2
ohai-gem
mobx-persist
npm-outdated
jmf
kbhit
executereader
stdmutex
install4j
react-rails
createfile
hjson
c#-7.1
babel-plugin
kdtree
sql-abstract
value-objects
react-material-ui-carousel
textutils
penn-treebank
jmstemplate
word-interop
ziparchive
aspose-cells
everscale
random-seed
checkboxfor
netoffice
pinvoke