## https://sploitus.com/exploit?id=6DA02B4B-C4CD-53F0-B242-A0FA9D182E0F
Python automation of the following [write up](https://www.vicarius.io/blog/bypassing-account-lockout-on-elabftw-and-brute-force-login-cve-2022-31007) on an elabFTW account lockout bypass and login brute force that affects versions before 4.1.0.
Both scripts can be used against Proving Grounds Practice lab named Source, which is running a vulnerable version of elabFTW - a free and open source electronic lab notebook.
The account login requires an email address so a valid domain of any potential user needs to be known before brute forcing user names.
Once a valid account is found put that into the login brute force script.