express-brute package has an unpleasant vulnerability.
It allows to make thousands of password tries because of race conditions. Increment operation is not atomic there. It is true for Redis, Memcached, etc as well. Set/Get approach implemented there.
There is related issue AdamPflug/express-brute#46
It results to an ability to brute-force passwords during small time window and then repeat it several times per day, depending on internal maxWait. If a hacker can instantly make 1000 requests, which is quite simple. And if maxWait is set to 1 hour as package readme example describes, a hacker can try 24000 passwords per day. It creates a possibility for slow brute force attacks.