I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
alloc
ninject-extensions
visual-glitch
oracle-apex-19.1
imagekit
pervasive-sql
xcodeproj
replaykit
externalizable
backoffice
half-close
syncfusion-blazor
camera-api
foselasticabundle
pymodbus
docx2pdf
windows-vista
msitools
ktor
stomp.py
redis-cli
ftp-server
opengl-es-3.1
get-wmiobject
compilation-time
tf2onnx
pixel5
alfresco-enterprise
qtscript
radare2