Yeah I'm not impressed. It just gives you an interface to select how many times you want to encode a reverse tcp meterpreter payload, adds some C code that sets a void pointer to some random garbage, cross compiles the result, and opens the metasploit client. Basically...this is just another way for noobs to do even more noob things with a noob script, and not learn anything.
The only reason this would create something FUD is because of the amount of times it will encode using different encoders. I don't know if traffic between meterpreter and metasploit is encrypted (with something like TLS), but if it's not then any heuristic based anti-virus/IDS/IPS would still be able to stop this. Even more so if the aforementioned systems were capable of stateful packet inspection.