I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
ampy
iphone-standalone-web-app
itable
windows-virtual-desktop
pyhook
etherpad
slather
fasttime
android-canvas
accelerometer
instana
git-rm
ruby-on-rails-4.2
autocommand
huawei-iap
onappear
pdf
ionic-keyboard
input-method
jython
orcid
android-statusbar
jira-zephyr
fasta
content-length
jsonpath
libgphoto2
eclipse-microprofile-config
default-interface-member
sos