I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
urlconf
ionic-native-http
google-api-nodejs-client
hash-location-strategy
torchtext
icloud-api
smbj
mdiparent
ntp
appodeal
httpresponse
gnome-shell-extensions
aws-iot
rpath
lang
codelyzer
storekit
iphone-3gs
symfony-eventdispatcher
atomikos
redux-form
com.sun.net.httpserver
expansion-tile
ora-00928
facebook-debugger
dynamics-crm-4
monarch
csrf-token
django-rest-auth
paypal-plus