I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
nsformatter
start-activity
distributive
jquery-ui-tabs
xctest
color-palette
form-processing
niagara-4
factory
yarn-v3
jmeter-3.2
timing
appendgrid
scrollto
sita
rdfox
dsolve
spring-integration-aws
associative-array
aws-datasync
ribbonx
aggregation
rackup
jad
teamcenter
eiffel
returnurl
android-clipboardmanager
states
filelock