Evolve the Method, Not the Prompts: Evolutionary Synthesis of Jailbreak Attacks on LLMs