I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
cucumber-jvm
keyboard-focus
pyinsane
dvi
python-ldap
werkzeug
gjslint
geant4
bignumber.js
xcode-bots
mdptoolbox
trialware
browser-plugin
drawer
theming
use-form
flask-peewee
direct3d
photoview
playframework-2.1
iwconfig
loginview
komodo
node-cluster
phoenix
p-np
codebase
python-db-api
abbyy-cloud-ocr
odoo-11