I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
getimagesize
dmesg
std-variant
modular-arithmetic
regexp-like
caroufredsel
truffleruby
angular2-mdl
java-threads
cross-apply
octokit-js
os.system
ngx-mydatepicker
.net-4.7.1
tensorrt
namevaluecollection
dompi
jquery-datatables-editor
julia-studio
embedded-postgres
piet
android-window
struts2-namespace
vis.js-network
systemc
bexio
restier
fatbin
edgar
localstack