I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
rmi
vim-go
chart.js2
plperl
variable-types
linkedin-api
azure-functions-core-tools
aws-api-gateway
sessiontracking
mit-scratch
php-cs-fixer
subtree
clone-element
swashbuckle
ruby-on-rails-4
net-use
dbghelp
typesetting
vim
pgjdbc-ng
jsm
openlayers
cakeemail
string-to-symbol
custom-dimensions
devops-insights
django-template-filters
usrp
3d.io
google-play-games