We're the coolest cats in cyber security!
No‘Wareto HideFind what other tools are missing, and rapidly resolve your investigations. |
Learn More |
SurgeTrustworthy incident response starts with reliable, verifiable data collection. Volexity’s Surge Collect provides a flexible solution that improves the speed of response and the recovery of valuable memory-only artifacts. |
Learn More |
VolcanoA comprehensive, cross-platform, next-generation memory analysis solution, Volexity Volcano’s powerful core extracts, indexes, and correlates artifacts to provide unprecedented visibility into systems’ runtime state and trustworthiness. |
Learn More |
Volexity is a Washington DC-based cyber security firm with a global reach, offering key services that assist in protecting your most important data assets. Through comprehensive network security monitoring, agile incident response, proactive threat assessments, and cyber threat intelligence services, Volexity is able to provide holistic cybersecurity solutions to any organization regardless of size.
Read Volexity’s latest published threat intelligence research.
Blog Post |
APT Meets GPT: Targeted Operations with Untamed LLMs October 8, 2025 |
Read Blog Post |
Blog Post |
Go Get 'Em: Updates to Volexity Golang Tooling August 11, 2025 |
Read Blog Post |
| Blog Post | Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows April 22, 2025 |
Read Blog Post |
Trustworthy incident response begins with dependable, verifiable data collection. Volexity Surge Collect provides a reliable and commercially supported collection capability with flexible storage options, an intuitive command-line interface, and it supports Windows, Linux, and macOS. Through Volexity’s Early Adopters Program, Surge Collect is currently in use by many of the largest federal and local law enforcement agencies around the world. Surge Collect is also actively used by leading incident response firms, technology companies, telecommunication providers, universities, Fortune companies, and branches of the military. These organizations face some of the most advanced adversaries, and they require reliable tools they can depend on.
Learn More
|
"Volexity functions integrally to our bespoke CIRT. Their FPC egress monitoring & analysis underpins our defense against advanced threats. In our years of association, I don’t recall a single false positive or bad piece of advice. This is the team you want on your side. They are alert 24/7, and they can handle large and complex networks, acquisitions, divestitures, and sensitive systems." - CISO, Leading Provider of Enabling Technologies for Industrial Growth Markets |
|
"We are an international human rights organization subject to APTs. Volexity guided remediation of our network when it had been hacked, and their monitoring and advice has kept us clean for three-and-a-half years since then. It’s a dangerous world and Volexity is the right partner for staying safe." - Director of Information Technology at an International Human Rights Organization |
|
"We are all super impressed with the new tool; you guys really hit it out of the park." - Federal Law Enforcement Agency |
This section is under construction! Check back soon for more cool stuff!