I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
image-processing
process-monitoring
grape-api
fuzzyfinder
structlog
pixel-shading
acceleratorkey
rise
grafana-datasource
enable-shared-from-this
c++filt
ssms-2017
beef
shazam
tcp
gridfs-stream
menustrip
theano-cuda
jquery-ui-autocomplete
phpspreadsheet
hyperfilesql
printstacktrace
nodejs-express-server
data-ingestion
qbxml
flatmap
spy
subtyping
excel-indirect
ruby-2.3