I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
dynamic-controls
elasticsearch-php
secure-transport
entity-framework-4
bamboo-artifacts
todoist
imagebrush
dovecot
alarmmanager
shady
digital-logic
nsscroller
theforeman
convex-optimization
pygame-tick
sslhandshakeexception
krita
pdftron
qwt
fasttime
cvlib
miracast
symfony-process
imdbpy
simpletransformers
videotexture
giphy-api
bolts-framework
rocksdb-java
dask-dataframe