Screenwriting ? The Lone Wolf Story Structure Template

Story Structure Templates are the fastest way to write screenplays. One of the most well known and often used templates, which goes beyond three and four act structure, is the Hero's Journey. Arguably, all stories are a variation of this template and the Lone Wolf is one of the most successful of those variations.

The Lone Wolf template is best explained with a combination of Arthurian Legend archetypes as well as Hero's Journey archetypes. A hero journeys to another land to discover the cause behind the death of blood relatives. A battle with Demon Kings, Enemy Knights, betrayal of an Oracle, Mentors, Shape Shifters and a growing set of revelations result in a Final Conflict and eventual catharsis. This hero can also be considered an anti-hero and this template allows for his final death with the inclusion of a Dark Knight.

The Lone Wolf story structure template consists of 56 sequences, which translates to approximately 2 pages per sequence to complete a full length screenplay. The first eleven sequences include:

1) The (developed) Hero interacts with a Demon King (1) and his Queen. There is a deep, forbidden relationship (maybe sexual) between the Hero and Queen, however, the Demon King is unaware of it and would disapprove if he knew. The Queen is uncomfortable with this situation but the Hero must keep it secret or similar, due to his dependent relationship with the Demon King, the Demon King's strength or that the Hero is in fact a Knight in the service of the Demon King.

2) The Hero feels the need to embark on an adventure, to discover the cause of a recent tragic event, where a family member died ? he suspects that the relative was murdered. The Demon King warns the Hero not to embark on the adventure; references to the dangerous nature of the adventure and the land therein; references to the dangerous nature of antagonists he will encounter there; references to the dangerous nature of the hero himself; references to the hero's status. Reasons may be given as to why the Hero must embark on the adventure. The Demon King may forbid the Hero to travel to the adventure; he may not desire relations with that Kingdom jeopardised.

3) Hero journeys to the land of the adventure. En route, we learn more of his character through his behaviour.

4) Hero arrives at the land of the adventure and makes his way to a social arena, usually an inn, which is full of strange and unfamiliar creatures. The (high) status of the Hero in this place is established. The Hero has arranged a meeting with a Mentor, who was familiar with the deceased and the events surrounding the death. However, the Mentor does not appear. The Hero (may communicate with the Mentor) is suspicious and learns somehow that the Mentor is not interested in this interaction.

5) The Hero enters the home or territory of the deceased relative, with special knowledge gained through some past experience. It is a dark and unwelcoming place. The Hero feels he is being watched. He finds a Magical Aid there. There are reminders of the blood relative's death, perhaps even the body of the relative waiting to undergo a death ceremony. The Hero demonstrates empathy and a closeness with the deceased.

6) The Hero finds a Safe Haven, where he meets an Ally (1). The Hero explains the rules and may have to buy the Ally's allegiance.

7) We learn more of the Hero's character through his behaviour.

8) The Hero investigates the death, by asking specialists, to see if it was caused by some foul play. There is no indication of foul play.

9) The Hero meets the close relatives of the deceased ? who are also related to him. The Hero queries them of the circumstances of the death. Indications as to how he died are given.

10) The Hero and the burial ceremony are being watched.

11) The Hero empathises with the relatives of the deceased and offers to provide support. He mentions his plans to marry the Queen, who is of course the property of Demon King (1) ?this also implies a coming conflict between Hero and Demon King (1).

The Hero's Journey and Lone Wolf story structure templates can be found at http://www.managing-creativity.com.

You can also receive a regular, free newsletter by entering your email address at this site.

Kal Bishop, MBA

**********************************

You are free to reproduce this article as long as no changes are made and the author's name and site URL are retained.

Kal Bishop is a management consultant based in London, UK. He has consulted in the visual media and software industries and for clients such as Toshiba and Transport for London. He has led Improv, creativity and innovation workshops, exhibited artwork in San Francisco, Los Angeles and London and written a number of screenplays. He is a passionate traveller. He can be reached on http://www.managing-creativity.com.

detailed home cleaning Park Ridge ..
In The News:

Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.

8 Quick Tips on Creating Vivid, Memorable Characters

These 8 tips on using characters in your stories will... Read More

How To Break Into Print Publishing

The big question. Do you submit directly to the publishers,... Read More

A Writers Inner Battle

There is a psychological nuisance so powerful that can deflate... Read More

The Heart of the Delay: Harnessing The Wisdom of Procrastination (AKA Writers Block)

I am sure that at in some era, at some... Read More

Write SMART: How to Create Terrific Writing Goals - And Achieve Them!

Open up your favorite calendar and circle today's date.Why? Because... Read More

Through the Eyes of an Artist

As writers, we initially tend to be either more cerebral... Read More

Effective Editing: It Spells the Difference!

If you think proofreading equals editing, then you're wrong! Editing... Read More

3 Tips to Achieve Your Writing Goals

1. Make your goals achievable.By achievable, we mean realistic and... Read More

Ten Ways to Get Cheap (and Free) Magazine Samples

1 - Join a reading or writing group. Ask members... Read More

Why Should You Use Worksheets For Proofreading?

Proofreading worksheets are a great tool to help individuals open... Read More

Need a Book Coach, Ghost Writer, or Editor? Part 2

If you either want to write a book to help... Read More

Business Writing Tip: Question & Answer Format

Traditionally, business writing uses the "one thing after another" format,... Read More

Pairs/Groups Of Words Often Confused - Part 1 of 6

ACCEPT, EXCEPT Not commonly seen even from unpublished writers, who... Read More

Writing Made Them Rich #4: Paulo Coelho

Paulo Coelho was born on August 24th 1947 in Rio... Read More

Are You Feeling Dash-ing? Using Punctuation for Effect and Influence

The dash--that curious mark of punctuation people use in their... Read More

Getting the Story Down

Questions and answers on writing life experiences for ourselves and... Read More

Get Published: The Nuts and Bolts of Good English, and How to Impress a Publisher (3)

A well-punctuated approach letter may make the difference between acceptance... Read More

10 Secrets For Everyday Writing Success

During my 25-year career in a variety of professional positions... Read More

Writing Technique: The Restaurant Syndrome

Picture this scene.Your hero is sitting in a bar. He's... Read More

Writing as a Gift

What am I supposed to give Anthony as a wedding... Read More

Sick of the Traditional Publishing Path?

A book coaching client recently emailed me that she was... Read More

A Checklist For Drafting Business Letters And Emails

Write Right - You have an all important business letter... Read More

Writers Block - Melting the Ice

What does one do as a writer who loves writing... Read More

Nonfiction Idea Generators

The hardest part of nonfiction writing is finding a subject... Read More

Write Your Story, Put It On A Website, Sell Millions of Copies

Although he has his own website, John Grisham probably does... Read More

express cleaning service Des Plaines ..