I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
mediator
authentication-flows
tablelayout
uribuilder
docopt
zerotier
pandas-to-sql
svelte-preprocess
precompiler
rserve
lmer
jcrop
drools-fusion
punycode
tablelayoutpanel
source
anonymity
manipulators
android-custom-keyboard
mybatis-dynamic-sql
render
bridge
react-table-v6
heroku-cli
notifyicon
outlook-2007
apollo-boost
kotlin-null-safety
vp9
memory-overcommitment