I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
dateformatter
angularjs-templates
trunk
msbuild-wpp
scripting
onigmo
oauth-1.0a
python-jsons
amazon-waf
google-authentication
colorama
nasm
uint
module-path
gcp-compute-instance
loose-typing
harp
google-cloud-dataproc-serverless
trailing-whitespace
nessus
solr-cell
aws-sdk-java-2.0
floating-labels
codecov
uialertaction
shared-module
mariadb-10.4
constrained-execution-reg
hp-uft
scalameta