Cybersecurity research experiments are frequently performed in ad hoc ways, which severely retards scientific progress. Most researchers use a combination of methods and infrastructure to conduct experiments using one-off, painstaking, and error-prone processes that are never shared for reuse and validation. The lack of repeatable, reproducible, and reusable processes and other artifacts limits one's ability to build upon the work of others or to compare solutions.