I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
goofys
pvs
datalore
mixed-type
imagemin
security-trimming
stage
groupingby
dlopen
animate.css
ss7
microsoft-teams
psych
roauth
simplexmlrpcserver
geoip
cypress-jquery
mapnik
react-navigation-drawer
coq-extraction
array-comparison
erlang-nif
typedjs
scom
angular13
altair
react-spring
hpack
maven-jar-plugin
roda