Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques Without Native Executable Code