I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
viewvc
odata
substratevm
primeng-dialog
xml-sitemap
mfc
flux-machine-learning
gdb-multiarch
datamaps
bytecode-manipulation
in-place
structopt
nanogallery
string-comparison
cpu-cycles
tclientsocket
dbgeography
dotconnect
mapserver
textstyle
mvc-editor-templates
dapper-extensions
javaparser
unhandled-promise-rejection
actioncontext
https-redirect
web-applications
run-war
temp-tables
python-development-mode