I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
adobe-launch
android-layoutparams
aem-core-wcm-components
hunit
fma
sign
minecraft-fabric
fact++
scout-sass
pandarallel
ti-nspire
ibm-connections
r-server
treecontrol
ctor-initializer
mondrian
mailchimp-api-v3
imread
hybrid-cloud
powershell-3.0
observedobject
react-native-picker-select
valums-file-uploader
dead-letter
mathematical-expressions
plaidml
sys-refcursor
oledbexception
angular-lifecycle-hooks
conference