I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
xcache
ncr
trimesh
vector-class-library
bounds
laravel-4
javafx
qtserialport
beaker-notebook
retrofit2
ionic-cli
ups
limesurvey
mouse
windowsversion
sobel
recvmsg
srec-cat
cellular-network
u8darts
tobject
bootstrap-cards
utf-16le
python-newspaper
luadec
opencart
biginteger
msxml
powerbi-desktop
gnu-efi