Volexity

Unleashing the Power of Cyber Investigations

We're the coolest cats in cyber security!

Internet Explorer Logo Netscape Navigator Logo
Spinning Earth

No‘Wareto Hide

Find what other tools are missing, and rapidly resolve your investigations.

Learn More
Divider

Surge

Trustworthy incident response starts with reliable, verifiable data collection. Volexity’s Surge Collect provides a flexible solution that improves the speed of response and the recovery of valuable memory-only artifacts.

Learn More
Divider

Volcano

A comprehensive, cross-platform, next-generation memory analysis solution, Volexity Volcano’s powerful core extracts, indexes, and correlates artifacts to provide unprecedented visibility into systems’ runtime state and trustworthiness.

Learn More
Divider

About Volexity

Computer Icon

Volexity is a Washington DC-based cyber security firm with a global reach, offering key services that assist in protecting your most important data assets. Through comprehensive network security monitoring, agile incident response, proactive threat assessments, and cyber threat intelligence services, Volexity is able to provide holistic cybersecurity solutions to any organization regardless of size.

Divider

Threat Intelligence

Read Volexity’s latest published threat intelligence research.

Divider
Volexity Blog
New Blog Post APT Meets GPT: Targeted Operations with Untamed LLMs
October 8, 2025
Read Blog Post
New Blog Post Go Get 'Em: Updates to Volexity Golang Tooling
August 11, 2025
Read Blog Post
Blog Post Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows
April 22, 2025
Read Blog Post
Divider

Collect with Confidence

Trustworthy incident response begins with dependable, verifiable data collection. Volexity Surge Collect provides a reliable and commercially supported collection capability with flexible storage options, an intuitive command-line interface, and it supports Windows, Linux, and macOS. Through Volexity’s Early Adopters Program, Surge Collect is currently in use by many of the largest federal and local law enforcement agencies around the world. Surge Collect is also actively used by leading incident response firms, technology companies, telecommunication providers, universities, Fortune companies, and branches of the military. These organizations face some of the most advanced adversaries, and they require reliable tools they can depend on.

Learn More Progress Bar

Testimonials

"Volexity functions integrally to our bespoke CIRT. Their FPC egress monitoring & analysis underpins our defense against advanced threats. In our years of association, I don’t recall a single false positive or bad piece of advice. This is the team you want on your side. They are alert 24/7, and they can handle large and complex networks, acquisitions, divestitures, and sensitive systems."

- CISO, Leading Provider of Enabling Technologies for Industrial Growth Markets

"We are an international human rights organization subject to APTs. Volexity guided remediation of our network when it had been hacked, and their monitoring and advice has kept us clean for three-and-a-half years since then. It’s a dangerous world and Volexity is the right partner for staying safe."

- Director of Information Technology at an International Human Rights Organization

"We are all super impressed with the new tool; you guys really hit it out of the park."

- Federal Law Enforcement Agency

Divider !!! IMPORTANT ANNOUNCEMENT: Visit our new product demo page! !!!

Under Construction

This section is under construction! Check back soon for more cool stuff!

Construction

Under Construction New! Generate your own 90s page here! Under Construction