Warning: The following techniques are so advanced, you'll be required to wear a ninja mask while attempting to use them.
Inject Perl code into your target system's clipboard, leaving no digital trail.
Use regular expressions to turn your opponent's codebase into a tangled mess of errors.