I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
monospace
webex
fibers
epoll
ovh
domain-model
rds-data-api
avx512
fieldofview
c-preprocessor
mysql-connect
hints
gopherjs
system.configuration
content-delivery-network
parallel-builds
custom-url
avplayeritem
redundancy
vitess.io
elastalert
showcaseview
nanoframework
jenkins-api
elyra
kerberos
qmake
advising-functions
react-charts
django-auditlog