I came across this payload named "Shikata Ga Nai" (in Japanese it means nothing can be done about it). Some exe file was generated and when it is executed, a reverse shell can be obtained. But this can be done by many payloads on Metasploit. Is there anything unique about this encoder?
Edited: As mentioned by Micheal, it is not a payload but an encoder.