I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
device-owner
directorysearcher
apache-commons-config
yara
typescript4.0
typed.js
main-memory
ixguard
scenarios
pkpass
apache-commons-dbutils
pydictionary
shader-graph
colima
database-scripts
http-status-code-304
amazon-sagemaker
focuslistener
win32-process
cakephp-3.x
wagtail-search
cassandra-cli
aws-elasticsearch
fieldeditor
numeric
nuance
clang
laravel-authorization
canactivatechild
ejb-3.0