I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
selenium-extent-report
gsql
r-portfolioanalytics
stackpanel
os.system
bioinformatics
invocationtargetexception
gnat-gps
dotnetnuke
avcodec
ibm-domino
gltf
aws-media-live
lpcstr
tortoisegitmerge
google-cloud-code
custom-button
svg-animationelements
richeditabletext
s3transfermanager
travis-ci-cli
csvwriter
git-crypt
pdu
zurb-foundation
container-registry
parent-pom
denormalization
gitea
grafana-tempo