I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
textpad
star-schema
bytecode
azure-custom-domain
shelly
cpanm
libtorrent-rasterbar
ruby-on-rails-3.1
audacity
libavcodec
scd
ios-statusbar
angular-scully
hyperscript
spring-cloud-skipper
oracle-cdc
no-www
lpeg
amp-stories
epplus
multiple-arguments
record-classes
android-emulator
localserver
union-find
schema.org
gdi
pg-repack
geom-tile
build-error