I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
openweathermap
abstract-algebra
gunzip
jdbi3-core
control-m
jsbin
android-actionbar-compat
angular4-httpclient
facebook-friends
copyto
tableofcontents
vigra
movefile
xcframework
ds-5
fontspec
ime
process-state-exception
servlet-3.0
qtreeview
google-fusion-tables
react-key-index
scrapy-selenium
control-template
pcloud
whitesource
window-messages
gl-matrix
angular2-router3
360-panorama