I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
bluetoothadapter
angular-controller
uimodalpresentationcustom
sparkling-water
text-segmentation
falco
qtquick-designer
msdropdown
driveinfo
http-status-code-410
base32
data-fitting
spatial-data-frame
aws-feature-store
field-names
solr.net
google-photos
create-view
decimalformat
feasibility
project-explorer
sysdig
cin
spi
datasheet
sql-server-azure
iis-express
predestroy
wcftestclient
sql-fetch