I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
unison
aem-63
dse-graph
lwc
maven-jetty-plugin
aether
relaxng
haskell-snap-framework
workitem
html-webpack-plugin
widdershins
debezium-server
threadcontext
contextual-action-bar
webcola
type-coercion
azure-cli
xcode-workspace
cfc
tivoli
heavy-computation
pure-js
pygame-tick
midasr
file-sharing
ews-javascript-api
boilerpipe
jgit
aot
e2e-testing