I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
omegaconf
lcov
cardano
activity-monitor
jointjs
rel
bibtex
xamarin.uwp
tcpclient
finite-element-analysis
mobile-webkit
junos-automation
openprocess
gatk
typolink
database-comparison
control-m
fish
server-side-rendering
elastic-pipeline
non-relational-database
control-statements
gnustep
azure-sas
cplex
initializecomponent
freedesktop.org
parentdatawidget
bitmapshader
avcodec