I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
sinatra-activerecord
selling-partner-api
windows-share
scte-35
geogebra
octoprint
file-handling
nfc
gitx
flacbox
pagetabviewstyle
windows-shell
qgraphicsproxywidget
sign-extension
atlassian-forge
contentful-vault
spring-rest
force-download
uitableview
snorkel
java-metro-framework
distribution-identification
remote-host
instapaper
open-liberty
flatmap
drupal-taxonomy
zerigo
oso
supabase