I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
sizer
sap-web-ide
vegeta
signalrcore
ofed
transient
hamburger-menu
mvp
image-viewer
youtube-data-api
dsbulk
cout
undetected-chromedriver
sql-null
execjs
computation-expression
qfileinfo
vnc
underscore-java
wordle-word-cloud
powerpoint-automation
string-length
projectile
roweditor
qdap
nvorbis
ksort
angular5
twitterizer
varchar2