I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
rocksdb-java
nanoframework
low-level-api
pgzero
spring-validator
deep-dream
interactive-mode
azure-git-deployment
mde
dynamic-dispatch
surface
laravel-package
cxml
site-search
quickfixn
foldable
angular-ui-bootstrap
mosaico
element-ui
orsserialport
webpack-remove-empty-scripts
selectpdf
iverilog
linker-flags
gac
ab-testing
apache-beam-kafkaio
gwr
clause
smartystreets