Users could read, edit, and back up contacts and text messages stored directly on the SIM card.

Its most famous (and controversial) feature was the "crawling" or extraction of the Ki (Authentication Key) . This allowed users to clone SIM cards that used the older, vulnerable COMP128v1 algorithm.

Most modern SIM cards use the AES or COMP128v2/v3 algorithms, which are mathematically secure against the "brute-force" scanning methods used by Woron Scan.

For advanced users, the software allowed for direct communication with the SIM card using APDU (Application Protocol Data Unit) commands. Modern Compatibility and Risks

Cloning a SIM card without authorization is illegal in many jurisdictions and is frequently associated with fraudulent activities. Modern Alternatives

For those looking to manage SIM data or perform legitimate mobile forensics, more modern and secure tools are available: