I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
xdp-bpf
mysqlupgrade
.net-spark
loop-unrolling
stripe.net
site-search
leakcanary
svgutils
latte
group-object
resttemplate
outlook-web-addins
flow-typed
terraform-loop
tornado-redis
prestashop-1.7
ghost-blog
beaver
gino
redis-server
polaris
information-theory
viewchildren
cypress-task
domdocument
structured-logging
griffin.mvccontrib
abstractmethoderror
eclipse-marketplace
eclipse-iot