I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
uisearchbartextfield
android-recyclerview
sendmailr
pdfsharp
rsync
shim
command-line-arguments
sumifs
ol3-google-maps
socketchannel
ocaml-opium
codelyzer
volume-shadow-service
event-driven
spring-boot-test
photutils
xml-attribute
nutch
page-index-changed
ios-frameworks
hibernate-batch-updates
usb-hostcontroller
react-native-gifted-chat
syntax
gamepad-api
boolean-logic
uinib
vb-like-operator
tire
bunit