I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
wbwebviewconsole
gyroscope
quantifiers
std-bitset
yii2-model
inkscape
applicationinsights-react-js
eglfs
rpmbuild
soapserver
dml
github-actions-artifacts
aapt
elasticsearch-6
shim
backticks
mercure
nestedlayout
safari-web-inspector
sophoslabs-intelix
visual-studio-app-center
prototype-pattern
camera
laravel-forge
react-infinite-scroll-component
qtsql
scrutinizer
system-generator
instrumented-test
invalid-object-name