I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
nuxeo
selecteditem
duktape
bintray
conda-build
compose-spec
android-ffmpeg
patch-package
openedx
symfony-mailer
falconframework
asbio
low-level-api
time.h
greenrobot-eventbus
command-execution
epoch
dataverse
amazon-sqs
petalinux
audio-service
viewchildren
leader-election
keycloak-authorization-services
mariadb4j
papaparse
nsmergepolicy
sample-data
legacy-database
ora-12170