I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
lr
drilldown
linear-gradients
wisej
apache-poi-4
using-declaration
huawei-mobile-services
porter-stemmer
utf-16le
getfiles
twitter-streaming-api
pii
contrast
astoria
sendkeys
mod-proxy-html
bigdata
securityexception
static-block
cuda-wmma
onmousedown
computed-values
telebot
sqlacodegen
hex-file
string-to-datetime
xml-publisher
tkinter-layout
quart
data-compression