I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
mobility
mediacapture
rscript
dotenv
specialization
sharedservices
androidsvg
top-level-await
phonenumberutils
insertion-order
aeron
dmp
scrapy-pipeline
file-pointer
msysgit
saprfc
fsck
go-http
django-statistics
gs-conditional-formatting
dbcp
singer-io
kotlin-multiplatform-mobile
linqtocsv
id-card
computation-expression
microsoft-oauth
grails-3.3
knapsack-problem
docx-to-pdf-conversion