Well, I don't use this myself, but I think it's a stretch to say it's fake and dangerous. I reviewed a lot of the code and looked for common indicators (base64, eval, etc) and didn't see anything, but of course there could be a million problems in plain site and with a large code base one just couldn't know. Both of these sites are just pointing to downloads at github:
(1)
https://unlockelementor.tk/ - points to the 3.8.0 version (old)
(2)
https://proelements.org/ - points to 3.13.2 version (newest)
These sites don't appear to add anything to nor change the releases from here:
This plugin enables GPL features of Elementor Pro: widgets, theme builder, dynamic colors and content, forms & popup builder, and more. - proelements/proelements
github.com
The question is, whether the github project is of pure intent and function and the code is working. I don't know. I do know that usually when people backdoor stuff on github it is found and reported and the whole account gets banned. I've personally reported a dozen different malware in github and seen the accounts closed, so I know it works. There are a couple of different ways to check for malware aside from code inspection, such as setting this up on a test site and then using security products to watch for changes in the filesystem and network traffic like outbound requests to a c2, things like that. (the plugin downloading secondary stage payloads, etc). I won't be doing all that work.
Also, based on the work those guys do when I look at the commit history and the length of time of the project, it would have to be a pretty elaborate trick if that's all it was.