I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
babel-plugin-module-resolver
routed-events
parse-cloud-code
remote-administration
mysqli-multi-query
python-holidays
query-builder
mouseleave
super-linter
nmap
double-quotes
zend-studio
data-wrangling
wumpus-world
android-auto
netflix-photon
accurev
winrar
foundry-contour
cfwebsocket
spatial
genesys
ngx-bootstrap
intersystems-cache
greenplum
dom-node
flow-router
citrus-framework
sequential-number
notation