Usually educational use tools leave a lot as "exercise" to the reader. They don't come with features that make malicious use easy. And you usually frame the intent of the software around that. Not as a for pay tool. So that argument does have validity... in an open source project or white paper describing some technique.
There is a reason researchers often leave some details of an exploitable vulnerability write up left as an "exercise" for the reader.
There is a reason researchers often leave some details of an exploitable vulnerability write up left as an "exercise" for the reader.