I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
system.data.sqlclient
netgraph
photosframework
openpose
turbolinks
intrinsics
databricks-connect
partial-sort
laravel-gate
timestamp
jdedwards
scrolledcomposite
cwp
proof-assistant
fortigate
xsltforms
neos-server
aptana
bindingnavigator
hubspot-api
castle-activerecord
linq-method-syntax
compare-contrast
material-table
git-reflog
atomic-design
nswagstudio
bixolon-printer
repast-hpc
cypress-code-coverage