Reverse Engineering Post-Quantum Cryptography Schemes to Find Rowhammer Exploits