I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
exadata
node-firebird
cloudflare
api-documentation
datamaps
deprecation-warning
curvycorners
kernel-mode
tidyselect
fontmetrics
execve
content-expiration
windows-subsystem-for-linux
case-folding
fieldtype
postman-newman
text-compression
dpm
aws-code-deploy-appspec
iar
double-underscore
selection-api
sobipro
jaxb-episode
groff
couchbase-sync-gateway
html-frames
blogspot
angular-meteor
safe-navigation-operator