I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
zendesk-sdk
squarify
string-matching
qmdiarea
relaxed-atomics
twitter-fabric
alamofire5
treelib
ckeditor4
bsearch
myisam
filetree
camel-core
ecm
file-system-access-api
snpe
gestures
kendo-editor
compile-time-weaving
nethereum
cypress-cucumber-preprocessor
postmark
aws-access-policy
system.drawing
google-cloud-dataflow
preflight
node-odbc
leading-zero
opalrb
laravel-query-builder