I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
rundll32
varray
console-redirect
custom-controls
rfc3339
multimarkdown
subprocess
conv1d
xmonad
qstandarditemmodel
qmodelindex
bitwise-or
mediacapture
onnx
mdxjs
inotifydataerrorinfo
google-cloud-error-reporting
dart-server
ory-hydra
lighthouse-ci
joomla-template
background-foreground
onsen-ui
wpf-extended-toolkit
macos-mojave
apple-watch-standalone
wps
python-sip
google-logging
formframework