I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
android-linearlayout
oraclevm
superagent
outlook-graph-api
splunk-query
windows-machine-learning
jersey-3.0
inotify
libtermkey
cassandra-3.0
scoverage
recursive-query
generic-foreign-key
vip
gridextra
varint
sessionid
random
in-parameters
minio
hit
testbook
colormatrixfilter
jfxpanel
autocommit
cocos2d-x-3.0
conic-gradients
memory-segmentation
pinning
babelfish