I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
grub
nsxpcconnection
java-server
hiveql
adobe-analytics
in-function
clib
lossless
notify-send
spring-boot-cloud-streams
less
cartesian-product
angular-router-guards
azure-workflow-automation
geom-vline
handsontable
owasp
proc
maptools
azure-worker-roles
request
testability
amazon-kinesis-kpl
qa-c
bitmask
nstabviewcontroller
webrequest
landscape-portrait
requestvalidationmode
stacked-chart