I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
autosar
spring-filter
roc
workflow-engine
delivery-status-notification
metronic
portability
acrylic-material
code-signing-entitlements
kube-apiserver
azureportal
maven-shade-plugin
cvx
inspector
hyperledger-besu
phpoffice-phpspreadsheet
rocksdb
webapi
laravel-ui
ucrop
samd21
pairwise
rails-traceroute
struts2-config-browser
quotaguard
loadlibrary
adminjs
ora-00907
android-ibeacon
epicor