I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
aws-lambda-containers
ftdi
status-update-notification
activeresource
agents.jl
maven-cobertura-plugin
bcrypt
multiple-forms
iis-8
stripe.js
qt-necessitas
cupertinopicker
itextrenderer
sqlalchemy-migrate
kosaraju-sharir
wso2-stratos
postgresapp
dgraph
calculated-property
paypal-subscriptions
layoutsubviews
mobicents-sip-servlets
ddd-service
revenue
code-collaborator
android-tablelayout
lnk2001
libclang
lockbits
react-responsive-modal