I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
qt-installer
color-gradient
aws-feature-store
inputsimulator
pyopenssl
vue2-dropzone
jscharts
typechecking
pps
selectedindex
default-constructor
snakeyaml
rocket.chat
kubernetes-go-client
macos-carbon
cyclic-dependency
rave-reports
jquery-multiselect
xhtml
xlutils
lcov
ggplot2
wordpress-login
android-scrolling
authorize.net-webhooks
inotifypropertychanged
nock
amazon-inspector
mef
flash-builder