Even shady software can have uses -- the same software a hacker might use to get into a system is used by pen testers and white hat hackers to test and secure those same systems. Code is neutral.
I was using the idea of shady stuff as at least some way to look at some code that for instance turns off a computer's fan to force it to overheat... I would call that shady because while someone could be using it to increase cybersecurity the likelihood would be much more negative hence my reasoning.
reply