I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
mvvmcross
esri-loader
dotnetopenauth
provider
airtable
heroku-ssl
gimpfu
angular-cdk
freedesktop.org
lpsolve
netbsd
pyshark
insomnia
jeromq
reboot
insert
ispostback
extendscript
sql-subselect
nodeclipse
strip
sqlncli
expression-bodied-members
stream-builder
bootstrap-native
conan
fitsharp
rigid-bodies
reverse-iterator
pwa-studio