I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
mutual-information
ssms-2017
s3-rewrite-rules
indexed
powershell-remoting
hoppscotch
watson-conversation
joyent
oauth
overflow
markov-chains
tombstone
ihttpclientfactory
swipe-gesture
row-major-order
ignore-case
contenteditable
fdb
jqplot
expose-loader
app-thinning
meteor-autoform
jprofiler
scholar
windows-restart-manager
typescript-json-schema
pact-lang
heremaps-imageapi
renderui
glowscript