I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
altorouter
rfcomm
taiga
border
activity-monitor
jetbrains-space-automation
webengine
android-customtabs
modbus-tcp
mysql-slow-query-log
gtk2
snowflake-sql
differentiation
react-native-state
react-native-snap-carousel
vb5
sysprep
eslintignore
fmp4
scrutinizer
raspberry-pi-zero
onpurchasesupdated
google-speech-to-text-api
filestream
ninject.web.mvc
binary-search
azure-durable-functions
nativescript-background-http
buefy
slonik