I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
libswresample
boot
nmssh
avplayer
fingerprintjs2
svelte-jester
boomerang
user-agent
filter
pdfrenderer
uicontentview
state-diagram
qxmlquery
cubit
entity-framework-5
kepler
mongoid
redmine-api
overlayfs
atag
network-traffic
dropbox-java
rhel
source-engine
textblob
android-buildconfig
roboto
proxyquire
rainerscript
playframework