I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
apply
github-enterprise
lnk2005
jfrog-pipelines
barman
react-gql
google-civic-information-api
catiledlayer
remote-branch
rpostgres
identification
spotipy
live-preview
android-exifinterface
polylang
subclass
mediatorlivedata
lwp-useragent
prosody-im
openwebrtcdemo
livequery
deep-learning
applet
mysql-workbench
stored-functions
smooch
multiple-cursor
rpy2
msrpc
multi-configuration