I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
libc
goldbach-conjecture
classpath
property-wrapper-published
mockttp
x509
sensormanager
python-appium
rapidjson
waterline
freeswitch
apriori
visual-studio-code
yahoo
logistic
google-search
boost-test
smart-http
data-integration
pagetabviewstyle
container-registry
jaybird
unwind-segue
zendesk-app
stellargraph
android-vibration
qodbc
xregexp
nsexpression
uipopover