I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
oracle9i
argument-unpacking
mongodb-3.6
stayontop
hive-partitions
opalrb
swiftui-state
picker
apache-commons-vfs
survival
tinymce-5
amazon-timestream
fading
assignment-operator
instruction-encoding
fluid-styled-content
oct2py
ftplib
shared-objects
value-initialization
system.version
nssm
url-rewriting
md5
inext
fibers
tkinter
turn-by-turn
qwebelement
meraki-api