I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
compound-key
high-order-component
lua-scripting-library
web-search
os.walk
appframework
in-clause
geneos
cfbundledocumenttypes
suppression
restriction
uicollectionlayoutlistconfiguration
terrier
listeners
fnmatch
objenesis
ackermann
rust-rocket
tsoa
gfsh
grouping-notifications
librt
mdc-components
internal-server-error
codecvt
pyinsane
spotbugs
re2-syntax
security-constraint
polipo