I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
streaming
distributed-algorithm
oracle-xml-publisher
database-view
garbage-collection
materialcardview
stream-json
google-container-os
freebase
torrent
passport-jwt
jquery-ui-contextmenu
livy
spring-cloud-feign
insert-image
hill-climbing
rgb
nvme
next-redux-wrapper
cassandra
dpll
adobe-javascript
pug-loader
apex-trigger
uhd
db-first
email-verification
laravel-cashier
hilla
git-subtree