I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
irr
mysql-function
chromium
system.printing
egit
feature-store
arduino-mkr1000
android-exifinterface
pandas-timeindex
sequence-diagram
maven-install
qt5.11
interval-arithmetic
exceptionsubscriber
spring-batch-admin
graylog3
gcdwebserver
pairing
socket.io-1.0
circom
evict
tcp-ip
uimenu
invalid-characters
filetree
iptv
teradata-sql-assistant
python-closures
usermode
python.net