The specific tools you mentioned mostly run on Windows as well as Linux, and are a starting point. However, until you gain some familiarity with Linux, more extensive toolsets such as "Kali Linux" will remain out of reach. An implication from your posting is that the budget is small, so tools like "Core impact" or engagements with firms that routinely do pentests are presumably out of reach?
You will need a written agreement with the testee covering the scope of work and authorizing it; otherwise you are liable to run afoul of the computer abuse laws of whatever jurisdiction you are working in. Are you allowed to inject data into web interfaces of production systems? Seed the organizations parking lot with USB drives full of spear-phishing links? Phone their service desk and attempt to get passwords reset for you?
-- Jim Leinweber, WI State Lab of Hygiene