Have you ever needed to install a tool to perform a two second job and spend eight hours figuring out dependencies? Have you ever been traveling and needing to install a software package to do a quick action, but find out that your laptop's 128GB drive won't be enough? By using Kubernetes to host these tools we can reduce the time it takes to perform essential reverse engineering and vulnerability analysis tasks. We can also reduce the setup time to teach others about reverse engineering and vulnerability analysis by having easy to deploy containers that won't have dependency issues to battle. This presentation will cover the journey that includes many successes and failures experienced while implementing a Kubernetes cluster designed for Android package reverse engineering and vulnerability analysis work. This will include selecting hardware, network setups, software used, building containers, and an adhoc usability study to inform the potential benefits and downfalls of using this system.