I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
hudson
vert.x-webclient
lbph-algorithm
ruby-module
scjp
desktop-wallpaper
bde
jsonexception
faces-config
youtrack-api
android-keystore
azure-vm-scale-set
testability
uipath
uplevel
dask-gateway
material-ui-x
android-gradle-plugin-3.3.0
remote-server
fencepost
timeout
sigma-grid-control
contourf
system-administration
osgi-http-service
appboy
vistime
apsw
build-environment
conftest