I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
scanf
portable-python
jsonconvert
self-extracting
componentmodel
code-sharing
swiftydropbox
openrtsp
maintenance-plan
angular-validation
dns-over-https
spring-gem
lookbehind
geoviews
swiftui-form
m2crypto
ps2exe-gui
tightly-coupled-code
formcollection
uidragitem
cran
html.actionlink
dry
google-website-optimizer
nest-api
vanity
glob
browsermob-proxy
intellij-13
wsdl.exe