I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
stan
xtext
devicemotion
nurbs
pdftotext
android-percentrelativelayout
fastboot
floor
composite-key
github-graphql
django-hstore
nosetests
micro-architecture
plyr
zoneid
pyppeteer
rapidclipse
android-viewbinding
grails-spring-security
zoom-sdk
rapidminer
materialdesigntoolkit
md5
shell32.dll
docklight
dynamic-linking
yaml-cpp
transactional-email
skype-bots
dataitem