I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
efk
drawingarea
amazon-ecs
mog
plymouth-script
dcos
flixel
module-info
db4o
objectify
codecave
handle-leak
ansible-module
help-viewer
serializearray
formatdatetime
nodemcu-build
wix3.6
single-dispatch
plotly-python
ant-colony
analytics.js
atlas
dry-struct
bpl
mclust
claudia.js
eregi
xamlparseexception
lint