I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
endlessscroll
bucket
uipangesturerecognizer
gpx
r-dbi
block
domino-designer-eclipse
jexl
playframework-2.3
select-string
innodb
xcode-build-settings
hvplot
closures
dm
jscoq
wix3.9
structure
ethernet-phy
typescript-decorator
bi-temporal
vue-styleguidist
react-native-braintree-dropin-ui
kendo-menu
system.version
enterprise-library-5
r-qgraph
microsoft-speech-api
haskell-language-server
xstate-react