I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
oracle-streams
sum-of-digits
sql-scripts
hangouts-chat
mithril.js
coin-flipping
safemoon
timed
textdecoder
exp
ecdsa
upload-max-filesize
vue-meta
simevents
applovin
git-annex
preference
usecallback
daemons
ropes
cdonts
structured-concurrency
single-source
twelvedata
helmet.js
libc
wtsapi32
law-of-demeter
snoopy
wfastcgi