I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
cryptoswift
drools
propel2
steamos
prebid.js
react-router-v5
ora-01481
turn
cereal
epsg
pkill
boyer-moore
preview-feature
swiftcharts
clickable-image
mci
symfony-cache
python-module
reactive-property
aws-codepipeline
perforce
iris-dataset
directxmath
dash-leaflet
fastjsonapi
drupal-commerce
adobe-embed-api
consul-template
jersey-1.0
isomorphic-fetch-api