I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
twill
gnome-3
flask-cors
public
xamdatagrid
nginx-module
oclazyload
datasheet
mom
unmarshalling
mailchimp-api-v3
imu
snmptrapd
phylogeny
preconditions
upstart
tiles2
actionview
galen
ouya
networkmanager
web-animations-api
cuda-context
mxe
querystringparameter
cssbundling-rails
aws-datasync
dynamic-assemblies
spring-shell
uncompyle6