I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
xperf
orientdb2.2
web-standards
idref
vmrun
django-mixer
outofrangeexception
svg-defs
lttng
mysql-group-replication
data-loss
play-billing-library
toolchain
swiftui-actionsheet
powerpoint-2010
tabu-search
xtend
jzmq
ply
toast
jwcrypto
vimeo-android
stubbydb
readable
plotrix
aqueduct
facebook-likebox
pytables
arangodb-php
mumps