I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
scorm1.2
soti
rrule
vertex-array-object
html2pdf
jetpack-compose-navigation
predicate
new-expression
meteor-accounts
webgl
bottomappbar
headset
compound-literals
microprocessors
textscan
linux-security-module
fabricjs
europepmc
zend-framework-mvc
github-flavored-markdown
app-engine-ndb
dpi-aware
apple-documentation
htk
beep
nshttpcookie
cordova-ios
nreco
git-review
servemux