Screenwriting ? The Lone Wolf Story Structure Template

Story Structure Templates are the fastest way to write screenplays. One of the most well known and often used templates, which goes beyond three and four act structure, is the Hero's Journey. Arguably, all stories are a variation of this template and the Lone Wolf is one of the most successful of those variations.

The Lone Wolf template is best explained with a combination of Arthurian Legend archetypes as well as Hero's Journey archetypes. A hero journeys to another land to discover the cause behind the death of blood relatives. A battle with Demon Kings, Enemy Knights, betrayal of an Oracle, Mentors, Shape Shifters and a growing set of revelations result in a Final Conflict and eventual catharsis. This hero can also be considered an anti-hero and this template allows for his final death with the inclusion of a Dark Knight.

The Lone Wolf story structure template consists of 56 sequences, which translates to approximately 2 pages per sequence to complete a full length screenplay. The first eleven sequences include:

1) The (developed) Hero interacts with a Demon King (1) and his Queen. There is a deep, forbidden relationship (maybe sexual) between the Hero and Queen, however, the Demon King is unaware of it and would disapprove if he knew. The Queen is uncomfortable with this situation but the Hero must keep it secret or similar, due to his dependent relationship with the Demon King, the Demon King's strength or that the Hero is in fact a Knight in the service of the Demon King.

2) The Hero feels the need to embark on an adventure, to discover the cause of a recent tragic event, where a family member died ? he suspects that the relative was murdered. The Demon King warns the Hero not to embark on the adventure; references to the dangerous nature of the adventure and the land therein; references to the dangerous nature of antagonists he will encounter there; references to the dangerous nature of the hero himself; references to the hero's status. Reasons may be given as to why the Hero must embark on the adventure. The Demon King may forbid the Hero to travel to the adventure; he may not desire relations with that Kingdom jeopardised.

3) Hero journeys to the land of the adventure. En route, we learn more of his character through his behaviour.

4) Hero arrives at the land of the adventure and makes his way to a social arena, usually an inn, which is full of strange and unfamiliar creatures. The (high) status of the Hero in this place is established. The Hero has arranged a meeting with a Mentor, who was familiar with the deceased and the events surrounding the death. However, the Mentor does not appear. The Hero (may communicate with the Mentor) is suspicious and learns somehow that the Mentor is not interested in this interaction.

5) The Hero enters the home or territory of the deceased relative, with special knowledge gained through some past experience. It is a dark and unwelcoming place. The Hero feels he is being watched. He finds a Magical Aid there. There are reminders of the blood relative's death, perhaps even the body of the relative waiting to undergo a death ceremony. The Hero demonstrates empathy and a closeness with the deceased.

6) The Hero finds a Safe Haven, where he meets an Ally (1). The Hero explains the rules and may have to buy the Ally's allegiance.

7) We learn more of the Hero's character through his behaviour.

8) The Hero investigates the death, by asking specialists, to see if it was caused by some foul play. There is no indication of foul play.

9) The Hero meets the close relatives of the deceased ? who are also related to him. The Hero queries them of the circumstances of the death. Indications as to how he died are given.

10) The Hero and the burial ceremony are being watched.

11) The Hero empathises with the relatives of the deceased and offers to provide support. He mentions his plans to marry the Queen, who is of course the property of Demon King (1) ?this also implies a coming conflict between Hero and Demon King (1).

The Hero's Journey and Lone Wolf story structure templates can be found at http://www.managing-creativity.com.

You can also receive a regular, free newsletter by entering your email address at this site.

Kal Bishop, MBA

**********************************

You are free to reproduce this article as long as no changes are made and the author's name and site URL are retained.

Kal Bishop is a management consultant based in London, UK. He has consulted in the visual media and software industries and for clients such as Toshiba and Transport for London. He has led Improv, creativity and innovation workshops, exhibited artwork in San Francisco, Los Angeles and London and written a number of screenplays. He is a passionate traveller. He can be reached on http://www.managing-creativity.com.

Airbnb cleaning service Arlington Heights ..
In The News:

Red flags like processing fees, urgent countdowns and requests for full Social Security numbers expose fraudulent settlement sites targeting consumers.
Comprehensive analysis of Google Maps, Waze and Apple Maps examines usability, routing accuracy, data handling and features across the top navigation platforms.
Expert analysis reveals whether wired Ethernet or wireless Wi-Fi connections are safer for home internet use, plus practical steps to secure your network from attackers.
Australian construction robot Charlotte uses sand, crushed brick and recycled glass to 3D print fireproof, floodproof homes with reduced carbon footprint.
Cybercriminals are using fake invitation emails to trick recipients into downloading malware and stealing personal information and data.
Flying drones could help retailers fight a 93% increase in theft rates as Flock Safety promotes airborne security systems to track suspects and deter crime.
The Fox News Artificial Intelligence Newsletter brings you the latest news on the emerging technology every Saturday, highlighting top stories.
Hacker group Radiant stole data from 8,000 children at Kido nursery chain, demanding ransom and directly contacting parents with intimidation tactics.
As 18 states implement bell-to-bell cell phone bans, creative students use Google Docs, iMessage on MacBooks and Post-It notes to stay connected in class.
A sheriff's captain says deputies often spend hours writing reports between calls, but Axon's AI program, Draft One, helps them save crucial time in the field.
Sora 2, OpenAI's new video-generation app, can create AI-generated videos based on a singular prompt. The results are both mind-blowing and terrifying.
iPhone and Android users can reduce Wi-Fi calling battery drainage through settings adjustments, background app limits and stronger Wi-Fi connections.
Work email scams are becoming harder to detect as criminals use AI and spoofed addresses to trick employees into opening malicious attachments and links.
From her Arizona living room, Christina Chapman ran a covert hub that helped North Korean operatives infiltrate U.S. firms, netting $17 million in stolen salaries.
UC Santa Barbara researchers developed a soft robotic intubation system that achieved 100% success rates for experts and 96% for paramedics with minimal training.
Scammers exploit probate filings to target grieving families with fake fees and debts, Kurt "Cyberguy" Knutsson reports.
Automotive giant Stellantis becomes latest victim of widespread Salesforce breaches affecting companies like Google, Cisco and Adidas this year.
A woman from Washington reunited with her missing Maine Coon cat Louie after 11 days using Love Lost, a free AI-powered pet recovery platform.
Expert cybersecurity tips help Mac owners remove malware infections and strengthen defenses with antivirus software, password managers and system updates.
Meta's AI chatbot training rules bans sexual roleplay with minors and block access to child abuse material as regulators scrutinize its safety measures.
Online banking users face a new threat: web injection scams that overlay fake pop-ups to steal logins. Here’s how to spot them and protect your accounts.
Meta introduced Teen Accounts to Facebook and Messenger while launching a School Partnership Program for U.S. educators to report bullying within 48 hours.
Executive order signed by President Donald Trump tasks Robert F. Kennedy Jr.'s MAHA Commission with using AI to find new cures for childhood cancers.
New FileFix attack tricks Facebook and Instagram users into running malicious PowerShell commands disguised as Meta account maintenance to deploy StealC infostealer.
Step-by-step instructions help users migrate to Windows 11 while preserving emails, contacts, documents, and software licenses during the transition.

7 Writing Muse Kickers to Fill Up That Blank Page

Nothing is more daunting for any writer than having to... Read More

Writing Query Letters that Count -- Close the Deal with Your First Letter!

Your query letter can be a deal maker or a... Read More

Pairs/Groups Of Words Often Confused - Part 3 of 6

ELICIT, ILLICITElicit means to extract or draw out; illicit means... Read More

Another Way to Show Your Expertise: Write a Book!

Maybe you should write a book! This is not as... Read More

Writers: Dr. Phil Goes Fishing with Oprah in His Tackle Box, Shouldn?t You?

Dr. Phil's Life Strategies, #1 New York Times Bestseller catches... Read More

The Run-on Sentence: From Here To Eternity

If you find your sentences filled with commas, and they... Read More

Tips On Writing A Killer Sales Letter

Writing a sales letter doesn't have to be that difficult... Read More

Turbo Charge Your Career! Write And Produce Your Own Stage Play!

Have you ever wondered how you can adapt your screenplay... Read More

How to Write Funny -- Its All About Timing

My Dad has this old joke that goes, "What's the... Read More

Writing Without Style

Style manuals are all well and good, and in fact,... Read More

Building Character

Names are important. Names give clues about us, where we... Read More

Bring Out the Natural Writer in You

Think you can't write a book that will sell? You... Read More

Screenwriting ? Five Golden Insights

Originality emerges from structure. Once you have a story idea,... Read More

What You May Not Learn In College... (Part Two)

If you become a writer for any publication, private business,... Read More

Secrets Of Successful Authors

When the writing bug hits you, get out your pencil,... Read More

Pairs/Groups Of Words Often Confused - Part 5 of 6

PASSED, PASTPassed is the past tense of pass. Past means... Read More

5 Easy Steps To Writing Your Appealing Letter

You must write a hypnotic persuasion letter to help you... Read More

Review of A Classic: Finneys Invasion of The Body Snatchers

To keep it simple and basic: Jack Finney's Invasion of... Read More

Understanding Editorial Guidelines

Editorial guidelines, also known as writer's guidelines, are the rules... Read More

Story Structure - Final Conflict

Beyond three and four act story structure, lies the Hero's... Read More

A Perfect Day for Writers

In one of the exercises in my "Getting Started as... Read More

Web Writing: Create Writing Flow With Four Uncommon Connectors

Connectors -- conjunctions, punctuation, and transitional phrases -- allow readers... Read More

Dont Get Burned: Evaluating Script Writing Contests

Hundreds of writing contests tempt screenwriters with the lure of... Read More

How To Break Into Print Publishing

The big question. Do you submit directly to the publishers,... Read More

How to Write a Short Story

Everybody knows writing a story is not easy. Like the... Read More

reliable maid service Winnetka ..