Comprehensive command-line tools for managing infrastructure, secrets, change management, and DNS from your terminal
Meta-package that installs all After Dark Systems CLI tools
The @afterdark/toolkit-all meta-package provides a single command to install the complete After Dark Systems CLI suite. This includes infrastructure management, change management, secrets management, and DNS analysis tools.
Infrastructure management for VMs, Kubernetes, GPUs, and cloud resources
Enterprise change management with compliance workflows (GLBA, SOX, HIPAA)
Secrets and certificate management with Vault integration
DNS analysis, security scanning, and threat intelligence
Cloud migration from Vercel, Fly.io, Netlify, and more
One-click deployment for Python, Node.js, and PHP applications
# Install the complete toolkit npm install -g @afterdark/toolkit-all # Authenticate with After Dark Systems ads auth login # Verify installation ads --version infra --version changes --version adkm --version dnsscience --version
Manage VMs, Kubernetes clusters, GPUs, and cloud resources
Create, list, start, stop, and delete virtual machines
Deploy applications, manage clusters, and scale workloads
Rent and manage GPU resources for AI/ML workloads
Unified interface for Oracle Cloud, AWS, and Linode
| Command | Description |
|---|---|
| infra auth login | Authenticate with Infrastructure Zone |
| infra vm list | List all virtual machines |
| infra vm create --shape VM.Standard.A1 | Create an ARM64 VM |
| infra vm ssh <name> | SSH into a virtual machine |
| infra k8s deploy -f manifest.yaml | Deploy Kubernetes resources |
| infra k8s logs <pod> | Stream pod logs |
| infra gpu list | List available GPU shapes |
| infra gpu rent --shape GPU.A10 --hours 4 | Rent GPU compute time |
| infra billing usage | View current usage and costs |
Enterprise change management with multi-industry compliance
Gramm-Leach-Bliley Act compliance for financial services
Sarbanes-Oxley compliance for public companies
Healthcare data protection compliance
European data protection regulation
| Command | Description |
|---|---|
| changes config init | Initialize CLI configuration |
| changes auth login | Authenticate with After Dark Systems |
| changes ticket create | Create a new change request |
| changes ticket list | List all change tickets |
| changes ticket show CHG-2025-00001 | View ticket details |
| changes ticket submit CHG-2025-00001 | Submit ticket for approval |
| changes approval pending | List tickets awaiting your approval |
| changes approval approve CHG-2025-00001 | Approve a change request |
| changes compliance audit --framework hipaa | Generate compliance audit report |
# Create a new change request changes ticket create \ --title "Database schema migration" \ --description "Add new user preferences table" \ --category database \ --industry healthcare \ --framework hipaa # Submit for approval changes ticket submit CHG-2025-00001 # Check approval status changes ticket show CHG-2025-00001 --status
Secrets and certificate management for SecretServer.io
Store, retrieve, and rotate secrets securely
Enroll, renew, and manage X.509 certificates
Generate and manage SSH key pairs
PGP key management and encryption
| Command | Description |
|---|---|
| adkm login | Authenticate with SecretServer |
| adkm secrets list | List all secrets |
| adkm secrets get <key> | Retrieve a secret value |
| adkm secrets set <key> | Store a new secret |
| adkm certs list | List all certificates |
| adkm certs enroll --domain example.com | Request a new certificate |
| adkm certs renew --all | Renew expiring certificates |
| adkm ssh generate --name deploy-key | Generate SSH key pair |
| adkm gpg generate --email user@example.com | Generate GPG key pair |
| adkm tokens list | List API tokens |
# Pipe secret value to another command adkm secrets get db-password -q | docker login --password-stdin # Command substitution export DB_PASS=$(adkm secrets get db-password -q) psql -U admin -W "$DB_PASS" mydb # Direct injection my-app --api-key $(adkm tokens get github-pat -q)
DNS analysis, security scanning, and threat intelligence
Query and analyze DNS records, DNSSEC, and configurations
Detect misconfigurations, vulnerabilities, and threats
Discover related domains by registrant
Real-time feeds and IOC detection
| Command | Description |
|---|---|
| dnsscience lookup example.com | Query all DNS record types |
| dnsscience scan example.com | Security scan a domain |
| dnsscience whois example.com | WHOIS lookup |
| dnsscience reverse-whois "Company Name" | Find domains by registrant |
| dnsscience dnssec check example.com | Verify DNSSEC configuration |
| dnsscience cert check example.com | Check SSL/TLS certificates |
| dnsscience mx verify example.com | Verify mail server configuration |
| dnsscience spf analyze example.com | Analyze SPF record |
| dnsscience threat-intel check domain.com | Check against threat feeds |
# Use as a Python library from dnsscience import DNSScience client = DNSScience(api_key="your-api-key") # Lookup DNS records records = client.lookup("example.com") # Security scan scan = client.scan("example.com") print(scan.vulnerabilities) # Threat intelligence threats = client.threat_intel.check("suspicious-domain.com") print(threats.risk_score)
Migrate from any cloud provider to After Dark infrastructure
Static sites, serverless functions, Next.js apps
Docker containers, PostgreSQL, Redis
Static sites, serverless, forms
App Platform, Droplets, databases
Shared hosting, VPS migrations
Cloud servers, managed hosting
| Command | Description |
|---|---|
| ads-migrate login | Authenticate with After Dark |
| ads-migrate analyze --provider vercel | Analyze existing infrastructure |
| ads-migrate plan create | Create a migration plan |
| ads-migrate start --dns cloudflare | Execute migration |
| ads-migrate status | Check migration progress |
| ads-migrate rollback | Rollback if issues occur |
All CLI tools include built-in help documentation:
# View help for any command infra --help changes ticket --help adkm secrets get --help dnsscience scan --help # Check version infra --version