Bypassing DEP in Metasploit modules